<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tls-reddy-composite-mldsa-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-tls-reddy-composite-mldsa-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="02"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 65?>

<t>This document specifies how the post-quantum signature scheme ML-DSA <xref target="FIPS204"/>, in combination with traditional algorithms RSA-PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for authentication in TLS 1.3. The composite ML-DSA approach is beneficial in deployments where operators seek additional protection against potential breaks or catastrophic bugs in ML-DSA.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of Composite scheme provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature schemes standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. The use of composite ML-DSA is valuable in deployments where disabling algorithms is complex or slow. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  mldsa44_ecdsa_secp256r1_sha256 (0x0907),
  mldsa65_ecdsa_secp384r1_sha384 (0x0908),
  mldsa87_ecdsa_secp384r1_sha384 (0x0909),
  mldsa44_ed25519 (0x090A),
  mldsa65_ed25519 (0x090B),
  mldsa44_rsa_pkcs1_sha256 (0x090C),
  mldsa65_rsa_pkcs1_sha384 (0x090D),
  mldsa44_rsa_pss_pss_sha256 (0x090E),
  mldsa65_rsa_pss_pss_sha384 (0x090F),
  mldsa87_ed448 (0x0910) 
} SignatureScheme;
]]></artwork>
      <t>Each entry specifies a unique combination of an ML-DSA parameter, an elliptic curve or RSA variant, and a hashing function. The first algorithm corresponds to ML-DSA-44, ML-DSA-65, and ML-DSA-87, as defined in <xref target="FIPS204"/>. It is important to note that the mldsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variants, such as HashML-DSA-44, also defined in <xref target="FIPS204"/>.</t>
      <t>In TLS, the data used for generating a digital signature is unique for each TLS session, as it includes the entire handshake. Thus, ML-DSA can utilize the deterministic version. The context parameter defined in <xref target="FIPS204"/> Algorithm 2/Algorithm 3 MUST be an empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> needs
to be taken into account.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0907</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0908</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha384</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0909</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha384</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090A</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090B</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090C</td>
            <td align="left">mldsa44_rsa_pkcs1_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090D</td>
            <td align="left">mldsa65_rsa_pkcs1_sha384</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090E</td>
            <td align="left">mldsa44_rsa_pss_pss_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090F</td>
            <td align="left">mldsa65_rsa_pss_pss_sha384</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0910</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="30" month="April" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-09"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 174?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61aW3bbyBH9xyo69EfGPgT1sGTLymskSooVP+Qx5eTky6cJ
NMkegWgMukGasT0ne8gGspYsJSvJrerGS5Q8dhKe4xEIoKvreetWc+I4jpx2
mToWg3dWCTMTY7MsjNVOiVcv47PJidC5uH45EXujx4NITqelWn3ly4l0am7K
zbGwLo2i1CS5XGKntJQzF7vMxqVK002c1ELiZZZaGWdYZ11kq+lSW6tN7jYF
ll2eX19EebWcqvI4SvHOcZSY3KrcVvZYuLJSETR7HMlSSWg4UUlVarcZRGtT
3sxLUxW4C+UG0Y3a4F56HIk46E1XF5dvJvu7B3TZmBVFsnILU9KrkcBnVmWZ
t+Jal9VSZsquZSnekiH8ginnMtd/kw56H4vX5kZLvp9AlWNxKvO5zEyp+F6p
5vzWC1nm0smb8Kapckdeu8zTsFgtpc6g/Y3JU6fL7+f0fQS/De7Sa2ncYiOe
myxTU6Vu7lDrTM/1WJWuo9kb7ZydVuV80VfiHTmno4LTy9GiFv19CkEJBPV0
8Xr8ySxy8cdSNm45FucQWVknXuolfJvygzqjwjO+Z12plDsW+4e7u2JiMgmr
xVsjU/Hvv/9DTCrKt73d3Y72V87JtRyKq9zJUpu+CWOZy7T2bQrVXuy/EI//
eNi160doO5pD2++VV4Qs2nbuJDHOiYusWpSqvMOxY20TIyYb69TS9vxmZ37R
9wm94v0V5aZcYuUKqSzeXoyPDg6e4Ao5enny+gQJEJ+NtHIzXyuzBM+fTjXk
Ng8yuSxsXPzUqSGr5/Y40vmsL/twn2U3K4ufKl3gvy5ebKalTmOnyqXOTWbm
G7wXiuGYbKgBgu7FdFO8MmmVqfildA7hj0+lVSknlZOZmOg5srkqlZg4RE6W
6YClyHJOQV04V9jjnZ18lRXV1I5yDWfPzWqHLujODu2z8/pycj2iqxF2HBXp
jGRw1YuZzCwK6HRyub+7v9dT8YdK5q5axlbOlEjKTeEMglqgHGJEEcosEV4s
HwqAQ4lrkaqVykxB962AuihK+BJfUw6pvVP39Xo9mlo9mkLkKFU7kwVAJz0z
id05M+s8Q6ranfPXO1Bx5001zXTihe2cliZZwDU7P3UUjbuK1qY2uEOf2NfP
4EKlqoSLr2Yz+F0gxACJEGiTixryxHfY+OGg9dhV4gxgU5C/IhHFcYy6Q5XJ
xEXR9UJbAXCuyAfCFirRM62sWJi1cAslkFcuDvoK2wTXJgu1bHD/48eQMZ8/
D6kJwIdTnXu11totgM8y1fQV6ssMbQE3l1a8nZzEb16MJw/2VnujwyF/nUyG
4nwMqfiT7h8e7j0bcmTO04ODI5HIXEyVqCjlyAHkKCgeXNxpQCNxDe2T2x1K
FkVpZLIQsHqqcgVPauiEdakqMrPxmbBeKNhoCrjbmdIKC7QTMm1MgAynEt5R
zqXOgWoF7kAPPASiyRuLmEFZJ+FnUyx0IqbV3NI+XpFRxHFY6jTN0GceIJJ4
Ma1YKEVFYb8VhQR9tnY/WVM5nc8pKoiR5IAgXvCKQ7SwMf6YJrs7mQUFrMcl
OKYTjP4rndDYCk6SHKIhihspp+LnKsuWMsd3uklBgfN1KXBbF4gBbbxSYgUQ
llxQcOKqynK4cZop0qy2BNAhkxvocoaUhT2UaciR3LJe9GYv73q1/N2bH8YP
h7QE4hFGogE6DXtUOTUkhAR1gAYL+KnFl2YKYM+VteTSKbqkUB8AOvScTMnV
+l5vjMRfFhrS14oTMDciM/kcJUW9YSN8X3N3u3UzpGVAHUNrc+OEBsCgtzuF
pUUmE5+mmXIqSEKW9MwvFb/mcxNtTWdk0UYs5Ioshu1zkyuYgxS0wHxUZ0l5
sgmQJrMYjCdDuJS3F/6Fo8wKFgTQc3q26eSwJn0YLTkes0yuLVL2XZ7pG2AC
erY2lUX6wkTGNhSTWyuV3+tCDhiKDA2QJCIEKDKOtBeiWJM1Fi26aYjnMjWF
o0DPQLVmpVkSQ5B6vnAAANCvdCTOUSkCtBL20C6NWgIVrE0KTHJiKTeEHKgq
OFXOFenPCJILMtptfm1vKY+k4gekhIa7ysKwossqcxr+EQWDewxCeUtllS8k
EhG44SEZrhsDqdhnjWsVgIWUIuuoaBkz1f0ViazwRSnWWOUWqHXo7isJhq9N
lVEWAxghjUEIqzPyNHxC2E16y5wMzzZhRwAZWLbySO9BDevRNiTjJ54sVQJb
tF36ci7VTAFceA+gwxtK09B2d7q4giLduX4onjO7sGgQX0U9Pn8eCbjKV7D4
Eb6zqU58gtHuMoNZ6abt0pTMiOFScsPmSodbABAi8+wkNCrbNA31IckqKhL4
gFoT9pGClBVeHWQYaAINDb6DVLdHndD54K0VEoRBuJ+Ot4sHq4Noa7LKG0Ou
x1NCLO6P31HyIzUNTU2pmG4e4mXsMqcazVt6kmzQyOusQu9ReULN+uPHQIfg
wCjabspUPfLLrRyIH/iatqyBYA4mLp1fvPSkr3brlEmfXzoKLGKpluYWg5Db
HTh08BzDodNs7Rf7uFhpyek5aDR+3xbFgL1y56P31AgGNSjC6b14bqkF/Vcy
q7iJ3MkG4Bc85G7RqUkbsPsDpaHNzHoUcr51sK1zpcsgiPkhgnAzTbDcAzuk
QhGe6VnTPHWGdcrXQEoTBLICjoOehPu+wrkPAq4q6vyd1gVy8QDpmxOZ8IUE
j123NSc+PkBC9arQ8w+CNRqUrRi8eje5Hgz9X/H6iq/fnv/w7vLt+RldT56f
vHzZXEThjcnzq3cvz9qrduX46tWr89dnfjHuit6taPDq5K8DTzAGV2+uL69e
n7wckLWuR1bJGwR1FDCoj65E2SRthLJMSj31Hjodv/nXP/cOUA6/wiC0v7f3
DPXgvxztPaXioEbkdzM5oQJ/pQYbgS0qNB3CCCBpIgvtxwcgn0V654IyYxR5
pPS+IkTnZt+u7Wut8whpoogdYhEkobfjpfN8nmm78FKGRNAVczriV82giBID
FudzRPW3f8ioW8RHf/h9dJvF16TIUjsPBJwIVifoKZhv7h30Ddh86cJC2xYQ
EgoTZ/R7jBuPWpQc97rYucfDR8dCnNxqcMo/YuBmIfh0mq1tuy3vmG/z2iDB
1nVggd+1JDo74vB5MXFTFy10PagRoJlcJwEQr7HYRie276wwqdOkQ7vdWsXH
H7YgUoco1GNKRG/WiBd6wtYsdQcMBuyL/nfsu5UhQCLLjHfLaPKYJ0buzvmJ
nmVIYAKWn3/+OVI5mslHDJt8endw8F4l+PsekFLsHz4p997bhcSF+G73w+6z
3acPh/WrTw47rz4+OvCv4iK8etS+evT0y68+a18lBfzUGJ6d9HfsPTvtrSux
QXGT2Fsqj3sCei+1GpxtS7KW//VknW/Lal9rpV30TefBl5/s7T4U0efbQfsN
ByI6p7GWzq82nSYsQfT1T5XqjeTIPlkPoqKQRHhQ6EOmwv1RDmmAAbCe6DxI
SswddkEda4YhggT6zjrTpe10HuwIomhRsilzYr9dfHAwrC+fHHqB4evRUwbW
XrE1DKYmIuBWBuwwZ8qMYUp5xsesn/z1iD1AlmNowvYBREHVaRYFd+IW6JGC
4Ldt5aQJQJ1JNIa0KTfUGVcwIyikkd34Ws+3w2ZIfo4HHfsY/++xI4oumduE
eQhMuz3MAJ2jEwfmGCINB2otThCg+GDSy4rCTSTJKj4mZ+dp6i8guERMST5h
CVaCwafIsBtFkarssMvFwEgz/TcVxjMP+DQWJ7W76pMU9NgPrk2XewwUJ00C
7O+0148FcwcawJBkywLcB7QZlo482WitrN/zhx3U0BEYqEL5nHLnDckddp4E
znQwOgBbRGQbgA6i2zwkx2JoiMNYRyDJhyfIIh5GO5yUtIiqMBldcGY3xlye
sU7YGDJ7t2kfUoenCyYid3XZe45tG4VrQt5Z3acQNQ1rhpqGLu/7BkXHvVQz
qG7FMzFKBDOTgmIWeqOyyxdqc/6BRrs5V/m49cWfydcbUA1rMWD47llLh8V5
8DcXxdepKqeo2Zqj9tYjGXSWqbnM3reJJTP6TYE68wS93b89houhl+TUb2lG
e9rchMHWUW8GtpaI91KHE77LJfEGUpInYKv44K1PNAqJPBiKZGEAK/4kgmQw
+bRBT0KWNaYgU5WJIl706NY5ZBcfG0QmDtUOtV+fMMNwYOLt2vhTLZp++Wyu
M4635dWdDLxufng25SZ2JrZVQQBLKdHV55dkiYzIZto9f42i0w1uL7XrzUx9
swHijtzZTSA24mus95OM327o8y4EONAnHq0YCZH/jJcUwmNBUXmlFCgjIk5D
HcN6M1bXg7CnQXcmEhdF/4jS42NoYZ354+sK/5G43D4V6Hp9qx1sJUzjiWai
5MzkU2yeIP1xoJJ+AuZjtboQQzmQCAj1J8X1WM8/s5YrP4A05+eYP6skdJlS
2xumtL5csXOV828wpmQu31hFHVXPq3BmOKSRd2l4QeP8KZ3uYAxhA3ge4zPR
0AfW4CfxSjn6zuU4EhcV52JVpDwucEZtZQJNZTqcsPfm8DYvWRz3lyb8amWy
laI2P/0RhpFsi4TOMNaRDvXJMXdcPtVMAkoF8AomjesDarY6YHz9MOk95Om+
sgHT69a2t0fe/aqSoPM/G/mp2KHh01EKHdUl/Hsona7Rbw0nr0/u0KqL2xQD
FIcfEmpKxb71WXJ77KEfs4Gem2FEW4VTd1OfKyZIllA2bcN+QkaFXzu5930S
f5YZ2I0Qn8QZl5BP0Ps+n8TbTgXQtxnGcTp39Y+jT3H9aa++9Pn0hW90Axr6
KYb2/oV5J2j4156+PR+PRCPwqBF4/1T0TQKfNQLvn52+SeBJz+QwRd0dlK8T
eNoz+f8gcNzVcGuW+y8EnnU13Jr7/guB51sa9mfEbxZ4saVhf5r8VoF7u720
4bnz7s8vCuRfN6cyuSG8OUlucrPOVDrng5ro47H/H3lU+rsB/5w/4CNHmd8w
xpwChP8C8FHlVIIg1mcRARr5R1c6CufKd6Ax/wErOPGnxyQAAA==

-->

</rfc>
