<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-sphincs-plus-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="jose-cose-sphincs-plus">SLH-DSA for JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-sphincs-plus-05"/>
    <author fullname="Michael Prorock">
      <organization>mesur.io</organization>
      <address>
        <email>mprorock@mesur.io</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Rafael Misoczki">
      <organization>Google</organization>
      <address>
        <email>rafaelmisoczki@google.com</email>
      </address>
    </author>
    <author fullname="Michael Osborne">
      <organization>IBM</organization>
      <address>
        <email>osb@zurich.ibm.com</email>
      </address>
    </author>
    <author fullname="Christine Cloostermans">
      <organization>NXP</organization>
      <address>
        <email>christine.cloostermans@nxp.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="20"/>
    <area>Security</area>
    <workgroup>CBOR Object Signing and Encryption</workgroup>
    <keyword>JOSE</keyword>
    <keyword>COSE</keyword>
    <keyword>PQC</keyword>
    <keyword>SPHINCS+</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 68?>

<t>This document describes JOSE and COSE serializations for SLH-DSA, which was derived from SPHINCS+, a Post-Quantum Cryptography (PQC) based digital signature scheme.
This document does not define any new cryptography, only seralizations of existing cryptographic systems described in <xref target="FIPS-205"/>.
Note to RFC Editor: This document should not proceed to AUTH48 until NIST completes paramater tuning and selection as a part of the <eref target="https://csrc.nist.gov/projects/post-quantum-cryptography">PQC</eref> standardization process.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://cose-wg.github.io/draft-ietf-cose-sphincs-plus/draft-ietf-cose-sphincs-plus.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-sphincs-plus/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/draft-ietf-cose-sphincs-plus"/>.</t>
    </note>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) serializations for the Stateless Hash-Based Digital Signature Standard (SLH-DSA), which was derived from Version 3.1 of SPHINCS+, a Post-Quantum Cryptography (PQC) based digital signature scheme.</t>
      <t>This document does not define any new cryptography, only serializations of existing cryptographic systems described in <xref target="FIPS-205"/>.</t>
      <t>This document builds on the Algorithm Key Pair (AKP) type as defined in <xref target="I-D.draft-ietf-cose-dilithium"/>. The AKP type enables flexible representation of keys used across different post-quantum cryptographic algorithms, including SLH-DSA.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-slh-dsa-algorithm-family">
      <name>The SLH-DSA Algorithm Family</name>
      <t>The SLH-DSA Signature Scheme is parameterized to support different security levels.</t>
      <t>This document requests the registration of the following algorithms in <xref target="IANA.jose"/>:</t>
      <table align="left" anchor="jose-algorithms">
        <name>JOSE algorithms for SLH-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">alg</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">SLH-DSA-SHA2-128s</td>
            <td align="left">SLH-DSA-SHA2-128s</td>
            <td align="left">JSON Web Signature Algorithm for SLH-DSA-SHA2-128s</td>
          </tr>
          <tr>
            <td align="left">SLH-DSA-SHAKE-128s</td>
            <td align="left">SLH-DSA-SHAKE-128s</td>
            <td align="left">JSON Web Signature Algorithm for SLH-DSA-SHAKE-128s</td>
          </tr>
          <tr>
            <td align="left">SLH-DSA-SHA2-128f</td>
            <td align="left">SLH-DSA-SHA2-128f</td>
            <td align="left">JSON Web Signature Algorithm for SLH-DSA-SHA2-128f</td>
          </tr>
        </tbody>
      </table>
      <t>This document requests the registration of the following algorithms in <xref target="IANA.cose"/>:</t>
      <table align="left" anchor="cose-algorithms">
        <name>COSE algorithms for SLH-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">alg</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">SLH-DSA-SHA2-128s</td>
            <td align="left">TBD (requested assignment -51)</td>
            <td align="left">CBOR Object Signing Algorithm for SLH-DSA-SHA2-128s</td>
          </tr>
          <tr>
            <td align="left">SLH-DSA-SHAKE-128s</td>
            <td align="left">TBD (requested assignment -52)</td>
            <td align="left">CBOR Object Signing Algorithm for SLH-DSA-SHAKE-128s</td>
          </tr>
          <tr>
            <td align="left">SLH-DSA-SHA2-128f</td>
            <td align="left">TBD (requested assignment -53)</td>
            <td align="left">CBOR Object Signing Algorithm for SLH-DSA-SHA2-128f</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="slh-dsa-keys">
      <name>SLH-DSA Keys</name>
      <t>Private and Public Keys are produced to enable the sign and verify operations for each of the SLH-DSA Algorithms. The SLH-DSA Algorithm Family uses the Algorithm Key Pair (AKP) key type, as defined in <xref target="I-D.draft-ietf-cose-dilithium"/>. This ensures compatibility across different cryptographic algorithms that use AKP for key representation.</t>
      <t>The specific algorithms for SLH-DSA, such as SLH-DSA-SHA2-128s, SLH-DSA-SHAKE-128s, and SLH-DSA-SHA2-128f, are defined in this document and are used in the alg value of an AKP key representation to specify the algorithm that corresponds to the key.
Like ML-DSA keys, SLH-DSA keys use the AKP Key Type.</t>
      <t>The thumbprints for SLH-DSA keys are also computed according to the process described in <xref target="I-D.draft-ietf-cose-dilithium"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC7515"/>, <xref target="RFC7517"/> and <xref target="RFC9053"/> applies to this specification as well.</t>
      <t>A detailed security analysis of SLH-DSA is beyond the scope of this specification, see <xref target="FIPS-205"/> for additional details.</t>
      <t>The following considerations apply to all parameter sets described in this specification.</t>
      <section anchor="validating-public-keys">
        <name>Validating public keys</name>
        <t>All algorithms in that operate on public keys require first validating
those keys. For the sign, verify and proof schemes, the use of
KeyValidate is <bcp14>REQUIRED</bcp14>.</t>
      </section>
      <section anchor="side-channel-attacks">
        <name>Side channel attacks</name>
        <t>Implementations of the signing algorithm <bcp14>SHOULD</bcp14> protect the secret key
from side-channel attacks. Multiple best practices exist to protect
against side-channel attacks. Any implementation of the SLH-DSA
signing algorithms <bcp14>SHOULD</bcp14> utilize the following best practices at a
minimum:</t>
        <ul spacing="normal">
          <li>
            <t>Constant timing - the implementation should ensure that constant time
is utilized in operations</t>
          </li>
          <li>
            <t>Sequence and memory access persistance - the implementation <bcp14>SHOULD</bcp14>
execute the exact same sequence of instructions (at a machine level)
with the exact same memory access independent of which polynomial is
being operated on.</t>
          </li>
          <li>
            <t>Uniform sampling - care should be given in implementations to preserve
the property of uniform sampling in implementation and to prevent
information leakage.</t>
          </li>
        </ul>
      </section>
      <section anchor="randomness-considerations">
        <name>Randomness considerations</name>
        <t>It is recommended that the all nonces are from a trusted source of
randomness.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="additions-to-existing-registries">
        <name>Additions to Existing Registries</name>
        <section anchor="new-cose-algorithms">
          <name>New COSE Algorithms</name>
          <t>IANA is requested to add the following entries to the COSE Algorithms Registry.
The following completed registration templates are provided as described in RFC9053 and RFC9054.</t>
          <section anchor="slh-dsa-sha2-128s">
            <name>SLH-DSA-SHA2-128s</name>
            <ul spacing="normal">
              <li>
                <t>Name: SLH-DSA-SHA2-128s</t>
              </li>
              <li>
                <t>Value: TBD (requested assignment -51)</t>
              </li>
              <li>
                <t>Description: CBOR Object Signing Algorithm for SLH-DSA-SHA2-128s</t>
              </li>
              <li>
                <t>Capabilities: <tt>[kty]</tt></t>
              </li>
              <li>
                <t>Reference: RFC XXXX</t>
              </li>
              <li>
                <t>Recommended: Yes</t>
              </li>
            </ul>
          </section>
          <section anchor="slh-dsa-shake-128s">
            <name>SLH-DSA-SHAKE-128s</name>
            <ul spacing="normal">
              <li>
                <t>Name: SLH-DSA-SHAKE-128s</t>
              </li>
              <li>
                <t>Value: TBD (requested assignment -52)</t>
              </li>
              <li>
                <t>Description: CBOR Object Signing Algorithm for SLH-DSA-SHAKE-128s</t>
              </li>
              <li>
                <t>Capabilities: <tt>[kty]</tt></t>
              </li>
              <li>
                <t>Reference: RFC XXXX</t>
              </li>
              <li>
                <t>Recommended: Yes</t>
              </li>
            </ul>
          </section>
          <section anchor="slh-dsa-sha2-128f">
            <name>SLH-DSA-SHA2-128f</name>
            <ul spacing="normal">
              <li>
                <t>Name: SLH-DSA-SHA2-128f</t>
              </li>
              <li>
                <t>Value: TBD (requested assignment -53)</t>
              </li>
              <li>
                <t>Description: CBOR Object Signing Algorithm for SLH-DSA-SHA2-128f</t>
              </li>
              <li>
                <t>Capabilities: <tt>[kty]</tt></t>
              </li>
              <li>
                <t>Reference: RFC XXXX</t>
              </li>
              <li>
                <t>Recommended: Yes</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="new-jose-algorithms">
          <name>New JOSE Algorithms</name>
          <t>IANA is requested to add the following entries to the JSON Web Signature and Encryption Algorithms Registry.
The following completed registration templates are provided as described in RFC7518.</t>
          <section anchor="slh-dsa-sha2-128s-1">
            <name>SLH-DSA-SHA2-128s</name>
            <ul spacing="normal">
              <li>
                <t>Algorithm Name: SLH-DSA-SHA2-128s</t>
              </li>
              <li>
                <t>Algorithm Description: SLH-DSA-SHA2-128s as described in FIPS 205.</t>
              </li>
              <li>
                <t>Algorithm Usage Location(s): alg</t>
              </li>
              <li>
                <t>JOSE Implementation Requirements: Optional</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.jose"/> Algorithms</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
              <li>
                <t>Algorithm Analysis Documents(s): <xref target="FIPS-205"/></t>
              </li>
            </ul>
          </section>
          <section anchor="slh-dsa-shake-128s-1">
            <name>SLH-DSA-SHAKE-128s</name>
            <ul spacing="normal">
              <li>
                <t>Algorithm Name: SLH-DSA-SHAKE-128s</t>
              </li>
              <li>
                <t>Algorithm Description: SLH-DSA-SHAKE-128s as described in FIPS 205.</t>
              </li>
              <li>
                <t>Algorithm Usage Location(s): alg</t>
              </li>
              <li>
                <t>JOSE Implementation Requirements: Optional</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.jose"/> Algorithms</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
              <li>
                <t>Algorithm Analysis Documents(s): <xref target="FIPS-205"/></t>
              </li>
            </ul>
          </section>
          <section anchor="slh-dsa-sha2-128f-1">
            <name>SLH-DSA-SHA2-128f</name>
            <ul spacing="normal">
              <li>
                <t>Algorithm Name: SLH-DSA-SHA2-128f</t>
              </li>
              <li>
                <t>Algorithm Description: SLH-DSA-SHA2-128f as described in FIPS 205.</t>
              </li>
              <li>
                <t>Algorithm Usage Location(s): alg</t>
              </li>
              <li>
                <t>JOSE Implementation Requirements: Optional</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.jose"/> Algorithms</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
              <li>
                <t>Algorithm Analysis Documents(s): <xref target="FIPS-205"/></t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Rafael Misoczki" initials="R." surname="Misoczki">
              <organization>Google</organization>
            </author>
            <author fullname="Michael Osborne" initials="M." surname="Osborne">
              <organization>IBM</organization>
            </author>
            <author fullname="Christine Cloostermans" initials="C." surname="Cloostermans">
              <organization>NXP</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), which was derived
   from Dilithium, a Post-Quantum Cryptography (PQC) based digital
   signature scheme.

   This document does not define any new cryptography, only
   seralizations of existing cryptographic systems described in
   [FIPS-204].

   Note to RFC Editor: This document should not proceed to AUTH48 until
   NIST completes paramater tuning and selection as a part of the PQC
   (https://csrc.nist.gov/projects/post-quantum-cryptography)
   standardization process.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS-205" target="https://doi.org/10.6028/NIST.FIPS.205">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NIST-PQC-2022" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022">
          <front>
            <title>Selected Algorithms 2022</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 249?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="jose">
        <name>JOSE</name>
        <section anchor="key-pair">
          <name>Key Pair</name>
          <figure anchor="SLH-DSA-SHA2-128s-private-jwk">
            <name>Example SLH-DSA-SHA2-128s Private JSON Web Key</name>
            <sourcecode type="json"><![CDATA[
{
  "kty": "AKP",
  "alg": "SLH-DSA-SHA2-128s",
  "pub": "V53SIdVF...uvw2nuCQ",
  "priv": "V53SIdVF...cDKLbsBY"
}
]]></sourcecode>
          </figure>
          <figure anchor="SLH-DSA-SHA2-128s-public-jwk">
            <name>Example SLH-DSA-SHA2-128s Public JSON Web Key</name>
            <sourcecode type="json"><![CDATA[
{
  "kty": "AKP",
  "alg": "SLH-DSA-SHA2-128s",
  "pub": "V53SIdVF...uvw2nuCQ"
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="thumbprint">
          <name>Thumbprint</name>
          <t>The thumbprint is computed as described in</t>
        </section>
        <section anchor="json-web-signature">
          <name>JSON Web Signature</name>
          <figure anchor="SLH-DSA-SHA2-128s-jose-protected-header">
            <name>Example SLH-DSA-SHA2-128s Decoded Protected Header</name>
            <sourcecode type="json"><![CDATA[
{
  "alg": "SLH-DSA-SHA2-128s"
}
]]></sourcecode>
          </figure>
          <figure anchor="SLH-DSA-SHA2-128s-jose-jws">
            <name>Example SLH-DSA-SHA2-128s Compact JSON Web Signature</name>
            <artwork><![CDATA[
eyJhbGciOiJ...LCJraWQiOiI0MiJ9\
.\
eyJpc3MiOiJ1cm46d...XVpZDo0NTYifQ\
.\
5MSEgQ0dZB4SeLC...AAAAAABIhMUE
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <section anchor="key-pair-1">
          <name>Key Pair</name>
          <figure anchor="SLH-DSA-SHA2-128s-public-cose-key">
            <name>Example SLH-DSA-SHA2-128s Public COSE Key</name>
            <sourcecode type="cbor-diag"><![CDATA[
{                                   / COSE Key                    /
  1: 7,                             / AKP Key Type                /
  3: -51,                           / SLH-DSA-SHA2-128s Algorithm /
  -1: h'7803c0f9...3f6e2c70',       / AKP Private Key             /
  -2: h'7803c0f9...3bba7abd',       / AKP Public Key              /
}
~~~
{: #SLH-DSA-SHA2-128s-private-cose-key title="Example SLH-DSA-SHA2-128s Private COSE Key"}

~~~~ cbor-diag
{                                   / COSE Key                    /
  1: 7,                             / AKP Key Type                /
  3: -51,                           / SLH-DSA-SHA2-128s Algorithm /
  -2: h'7803c0f9...3bba7abd',       / AKP Public Key              /
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="thumbprint-uri">
          <name>Thumbprint URI</name>
          <t>TODO</t>
        </section>
        <section anchor="cose-sign-1">
          <name>COSE Sign 1</name>
          <figure anchor="SLH-DSA-SHA2-128s-cose-sign-1-diagnostic">
            <name>Example SLH-DSA-SHA2-128s COSE Sign 1</name>
            <sourcecode type="cbor-diag"><![CDATA[
/ cose-sign1 / 18(
  [
    / protected / <<{
      / algorithm / 1 : -51 / SLH-DSA-SHA2-128s /
    }>>
    / unprotected / {},
    / payload / h'66616b65',
    / signature / h'53e855e8...0f263549'
  ]
)
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1aW3fTuBZ+96/QSR9oObXT9E4Ww5CmBVLapjQtDMOw1si2
nIj6NpLcEJjyW85vOb/s7C3ZSeyYFJie83DW5KG1pa19+fZFW0ps27YUVyFr
k8bg5IV9OOiQIBHkuD84IjT2SRceGhZ1XcFugOZDIpnt4R+ZjnjsSTsNM9mw
PKrYMBGTNpHKtyw/8WIaAVNf0EDZnKlgcZW9sWPJzI24lDyJ1SQF+t7R5TMr
ziKXibblA9O25SWxZLHMZJsokTEL1NiyqGAUVWZeJriaNKxxIq6HIslSGO0e
9C9I3/3APEUGfBjzeKhtOYo9MUkVCGtY12wCS/y2RWxtLP7v5v/PX3Xx3+D8
Re+sO/infjbYWDcszkAnQr5HFiHGuMYbUBIJnuNiHI8oD2EcoXmKIDmJGOI4
Fd4IxkdKpbLdbCIZDvEb5hRkTRxouiIZS9ZEBk1cOORqlLk5S3s8bC5zAC4I
AWOp5mTlCx3DyeHJUhZLJ52RisKGZdFMjRKBUINAQoIsDE10NE65N6IsJOci
EYl33dDzYByN+SeK4LVJxGQmQA09xXLAotQseFrMNmqY9wVnZKAYC1kd40tB
YxllipU4J7DoqSqmHB77mVQwJuskXNAAtT/lMvE+XfM6Kc+TZBiWRQi9KsoX
PR1qCsdLojoRBUJ96SYirjWkd3BaNkG6Tz9BWngjh7vR1xh3R4JLxWNGumGS
SMVEBEbX8T/75bzE3ytWOt7cyqfxx9TIsqw4gSEF0YqZ0uucdRysG+3ZYzHs
zYY9M3zxrLu309ppk+M3g+nrHr6+NK+PNna22nmqkp596FQj0OchhC7PojY5
PdFJa/E4mNfoWe98YG9u7LS1WdPypyAVQiYleUHlyD6gkvnkkEMe0FCnNlWZ
wICC9KbCN0gpKoYM0qfIHj/hOjlbG87uxuZ+86w3uHRQngPyYAW+21BfQPzm
ZkU+CPcUyOyEUEnBhEgSpKoX5EnhOTH4wRkmN03IH6xAspmCP+w/MhqrLLJ1
BUqGgqajSVPm7G06Za+VAHfZtk2oC2FOPWVZlyMuCRTwLGKxIj6TnuAuk+Ut
gUgmOA3zGJF6z8hr5DoZjyD2yJgCG6C6AZMCkUTTerpOKDlHPV8ZPUl3Tk+y
CuisEVej7+foyyn60huxiDlVJRPQL05Q2wAjmsYTErMxmQdgnSRxOEG959RO
AsI+6mAezhNzj8gJBHYkp/b7hMfk8+cidG5vHessUYyoBIOSHPlcQYkjZb3k
KMlCX2sGBctjwAXoO1eXL7b3SRYrHuqAIJA2acigEJOUCgqBygRR2XQvMa4D
hQlASpFGoeZqxMg7QOv9an1QpHcGxRrs1iaac0SMmlI6eVRE3PehelkrpBcr
kfiZVmNJjAz6Z8t3Q7KKcbRmAunOvZOsdjV1TbSh9d+ZsmQ1D9G1r8boayaw
GSFbTgshvs+Q/Usxy+8raCtauBkPfWAZazynlYe8ZBNyTrkgq52X52u6fyEa
K9Q1Z2ub8gpcIexh8ctzQ8di6oJTSBCCmvBEBEsFgx5OmRgD/aH7kiRDvKgn
EvCfz4OACdRoPlgr5s0q1zpo4IWZjxDkPnUwSi9hL+JxEibDCVrKUBDBPk/C
Tno1uGysm//krK+fL45eXfUujg7xefCic3IyfbByisGL/tXJ4exptrLbPz09
Ojs0i2GUlIasxmnnLcxgPDf655e9/lnnpIHAqZIDoJHFmuAymIK0B6BwC6DS
KvnwoHv+73+1tgH0f0C12Wy1Ht3e5i/7rb1teBmPWGyk6ZAxr+DTiUXTlFGB
XGgYEo+mGJ+AILgT6tM4JiMAHtB7+A6Red8mj10vbW0/yQfQ4NJggVlpUGO2
OLKw2IBYM1QjZopmabyCdFnfztvSe4H73ODjn0PMNru1//MTS4cM1pH85DOL
/2c04mEeQ8XsXEHRKU14Xq/BZYJ/MsVdZmmaQH2eBbTMzygkZDcslAspKNgf
GbTgUmegYEOOG3GRKDgWJGGYjHVxnHUGJgOnDdXtbduy/iRnoAwxnz+RGv4e
6jjS1dT6E2o6UOUG2eCiTbu1uS+RumZQc9El/Q1z58yfwTS37c8WliW8PKoT
MR39bhn5yhozgjozgh81I7A+t8mKPu/OwQ5leBj/1AhZoBqmc/upYRqjGc0c
t8btvXvbuxdvXx4cktVcF11vcL/SCto7rbWcZd3+/KO+XyZw84cE3hEIywRu
/biFJiy8bwiL7vKwWJnWFdhrpWWdQxcC3Ywu4eeZG8J+hxN6g0h162UKjNld
daigRZr+BupPMCFJysRch8QodDh5VC1UOOksrXy4OcvlPQFurbjfry9vDCD4
8fYGGgDd5oJ+Lh7QJos7/9c2e1CDKlRItxhoGYouNxWOKdUyZR4PyqtLRxOZ
ASag70LgrteEltlPFyJgXftkzuLKjg5rkEC3N9w0VpicNzTMGPqDxtqQRSP0
/qEtmBSrcug1Al4igDhNYuhmgFKZ9saxTvg1y4+6urGamjJts4wjQSa68BJ8
lsOlRlnkpgI6jxJMZh3aAI1Cot2W6RzyQAXdc+Xi89NCtd+c+l9HebH9dSEu
uV9EaO6vYtIrTSJKwOb4zeD2dt08vYQeB5GFF0wsfEvTkLMcCnBA4XtanJTG
LAzB0A6opygPmT8TR2MaTiTXggqj4c1lE0DX5JYH2WSyp8obooixUlutwaM+
nAFhGpp/I1DmKM8qesVKtGCC+mNjNu0kgLuqQLqoA3a7K+Q11B2f6oNAakrG
ta4lHeBX3j10AJn6wLDbnyPXWxIHZwdcSIVhmvO01AjKnKZxyLP8yIU1Z70o
OOgQiAFAyRxypG45dcQlgQXBliuoW6WibzSqDwAH4o1oHDPQVSnqXYPiPTwH
R0U+yKJ6yeJwOE2IvGkE4QprtzKxBM0zqmvpoxwibVckOOQ0CxUHIeBriady
CidaiGFzokJf5CwtOqQ8hqF6Nh04rfGSspVKay3oLAulMzj3Q7tY2e0r+oC7
qAVnGR5lEWz2tk4fOMeCjjxCeluvr+iQXziYgltUjdk6vGADT+QK6NCa7Rkg
Y4DbZeyZTShiUSKwTOsUT/FgjIxgtla0MQ4EsI+QZcqYxz6CPURinyIL3oAT
AivMXYIkq2gqiWCzwsZcN8lrwGYMmFV5lFXisc9SBn9ifR1iTvRpEk7iJILz
MlgKbFyGYOWRj4cjB+y8ijleCCJTqCEaTA/LXQ4fHMaG/IbFiA+vRKSOECjZ
4gbBzIsgcIeiAjpkVcYLHDS0hglIUOiQ4nISJkNGr+mQmRS5ANIkitFUr1I7
ewr9KBiU5ggR8I2vzaYRkjiJdQxhUmMqUPzmRLdBMsmE9oElptz1yRl7y4US
DUp08qqmLT8qrh0uTOMK5ReJVsgZG5trwVl/AUoiSy7JrAnDUuf7lcAHFMS0
jrMqm0LUxFmopebOzC930YrBMH6nUTRON9zX7V+5ouYXydob5nlbg76yUtPT
Wg91q92umXqINTiDqeUNNdDNdebtH+qsH5IuTalungCuNvn93bWavP8dxi+Y
7qA8UAPvIn+Bjx6dRkebvM09tVLXQdfZV8x9k4Gbf83Amaz7tjBv2b/qwODb
7Nu6BwcG92OeTrXj+0m1mjNx5fr1f5GHezut/aW5N8P161k4oym5afHsW1UA
mzgCTZxTYnIloQqTk8Q0W6tyrY37OJBo5MtdCiCj+yccAK/2U9MEoruhawA2
UFWVALyYyL/fzmOuAGzSrlzlzLv2IRmU+trD/JihdZoLlpnunaK3LUilpp3v
V5eWgiVwzxL1bryLs//fgNcCPqtMd4V38O3hHfyNtkEbv7tyoVPHzuboIzZj
pnyan3roOlrcZljWly9fPsgktj5DM9aAktxokwYclhvr+A64NGa/jZkVEjML
xyicfb2zNej5r585jpPdjDfjrPsqnxf8pkLgHb48ceXB24Z1i5L1ddICdzs1
t0H2h/F1cZ+U21FT04qro2k9B9vwium/Y9hyvfW58hvVNmfQqtbonMvpxUT1
ogJ3udmFRDnazdrFXc2qQPFV05eapq+C89Mh8+0Roz5+TXuXlYewi+POd16s
JC/0ytxBFpscj9znHu/zY0D5pHss6JtX8NbbOOXHj36znN+QJPW2TpGk5UXb
uz4Q/vI6/fUw2Ti7fMuDV5pq53RwNHy14f96sD1gJ12g6ejPQW90enV0l2Ef
xvJuW7p4gQcdzyLExnHmZxmL6fWFeG4ibJ/TofWZ3P1pmlMA8qibBR+22mRv
/Q4e8xdedTy22tibL+PSrMFgVomQhw2KjB7s7W9seRvBI8B8K9hlm97exoP1
KQ/Uo0jRqkmax2aVh+vSPer6VR7TW+GqLd9SSfSVtb6z/dZyUvggj9T/Yyfe
jwPuqInf4QAjZx7/clEkVxc9KIz9w76Z0ZSYi6S14KomMb/Lg9kW2NHaXwWL
31nGqmk5g+fHjz9bhbWzizZYQTTEtTg29YrbJ09yflk8z/Hz7Xohh07ChOLY
6MHu7m5r193deVBMzn4qgdM7W2x/Z4ftgxs2gs3drZ3tRw+A8L21tgzjqY12
S5sdJ1IBhHdXtBlyCDO0Cx3vOk7GIfOHurkAeebnqMz/qRHQUOpSh9ATOqVk
jvUfaST1n0krAAA=

-->

</rfc>
