<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="14"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 66?>

<t>This document specifies how the post-quantum signature scheme ML-DSA <xref target="FIPS204"/>, in combination with traditional algorithms RSA-PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for authentication in TLS 1.3. The composite ML-DSA approach is beneficial in deployments where operators seek additional protection against potential breaks or catastrophic bugs in ML-DSA.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of Composite scheme provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature schemes standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. The use of composite ML-DSA is valuable in deployments where disabling algorithms is complex or slow. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  mldsa44_ecdsa_secp256r1_sha256 (0x0907),
  mldsa65_ecdsa_secp384r1_sha384 (0x0908),
  mldsa87_ecdsa_secp384r1_sha384 (0x0909),
  mldsa44_ed25519 (0x090A),
  mldsa65_ed25519 (0x090B),
  mldsa44_rsa_pkcs1_sha256 (0x090C),
  mldsa65_rsa_pkcs1_sha384 (0x090D),
  mldsa44_rsa_pss_pss_sha256 (0x090E),
  mldsa65_rsa_pss_pss_sha384 (0x090F),
  mldsa87_ed448 (0x0910) 
} SignatureScheme;
]]></artwork>
      <t>Each entry specifies a unique combination of an ML-DSA parameter, an elliptic curve or RSA variant, and a hashing function. The first algorithm corresponds to ML-DSA-44, ML-DSA-65, and ML-DSA-87, as defined in <xref target="FIPS204"/>. It is important to note that the mldsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variants, such as HashML-DSA-44, also defined in <xref target="FIPS204"/>. Support for prehashed variants is not required because TLS computes the hash of the message (e.g., the transcript of the TLS handshake) that needs to be signed.</t>
      <t>Note that TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa_pkcs1_sha256 and mldsa65_rsa_pkcs1_sha384 to the "signature_algorithms_cert" extension and does not define them for use in the "signature_algorithms" extension.</t>
      <t>In TLS, the data used for generating a digital signature is unique for each TLS session, as it includes the entire handshake. Thus, ML-DSA can utilize the deterministic version. The context parameter defined in <xref target="FIPS204"/> Algorithm 2/Algorithm 3 MUST be an empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>. The Composite-ML-DSA.Sign function, defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be utilized by the sender to compute the signature field of the CertificateVerify message. Conversely, the Composite-ML-DSA.Verify function, also defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be employed by the receiver to verify the signature field of the CertificateVerify message.</t>
      <t>Note: In the LAMPS WG, it is being discussed that the composite signature API should avoid using protocol-specific encoding.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> needs
to be taken into account.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0907</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0908</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0909</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090A</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090B</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090C</td>
            <td align="left">mldsa44_rsa_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090D</td>
            <td align="left">mldsa65_rsa_pkcs1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090E</td>
            <td align="left">mldsa44_rsa_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090F</td>
            <td align="left">mldsa65_rsa_pss_pss_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0910</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 180?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
