<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-10" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-10"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <author fullname="Daniel Van Geest">
      <organization>CryptoNext Security</organization>
      <address>
        <email>daniel.vangeest@cryptonext-security.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="14"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 71?>

<t>Compositing the post-quantum ML-DSA signature with traditional signature algorithms provides protection against potential breaks or critical bugs in ML-DSA or the ML-DSA implementation. This document specifies how such a composite signature can be formed using ML-DSA with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide authentication in TLS 1.3, including use in certificates.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="RFC9794"/>.</t>
      <t>One practical way to implement a hybrid signature scheme is through a composite signature algorithm. In this approach, the composite signature consists of two signature components, each produced by a different signature algorithm. A composite key is treated as a single key that performs a single cryptographic operation such as key generation, signing and verification by using its internal sequence of component keys as if they form a single key.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of composite schemes provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature scheme standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with a traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="RFC9794"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
        <t>In this document, “composite ML-DSA” refers to a composite ML-DSA signature scheme as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes">
      <name>ML-DSA SignatureSchemes</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature schemes for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureScheme values for composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  /* ECDSA-based Composite */ 
  mldsa44_ecdsa_secp256r1_sha256 (TBD1),
  mldsa65_ecdsa_secp256r1_sha512 (TBD2), 
  mldsa65_ecdsa_secp384r1_sha512 (TBD3), 
  mldsa87_ecdsa_secp384r1_sha512 (TBD4), 

  /* EdDSA-based Composite */
  mldsa44_ed25519_sha512 (TBD5),
  mldsa65_ed25519_sha512 (TBD6),
  mldsa87_ed448_shake256 (TBD7),

  /* RSA-PKCS1-based Composite (for signature_algorithms_cert ONLY) */
  mldsa44_rsa2048_pkcs15_sha256 (TBD8),
  mldsa65_rsa3072_pkcs15_sha512 (TBD9),
  mldsa65_rsa4096_pkcs15_sha512 (TBD10),

  /* RSA-PSS-based Composite */
  mldsa44_rsa2048_pss_sha256 (TBD11),
  mldsa65_rsa3072_pss_sha512 (TBD12),
  mldsa87_rsa3072_pss_sha512 (TBD13), 
  mldsa65_rsa4096_pss_sha512 (TBD14), 
  mldsa87_rsa4096_pss_sha512 (TBD15)  
  
} SignatureScheme;

]]></artwork>
      <t>Composite ML-DSA is treated as an opaque signature algorithm by TLS, 
similar to Ed25519 and Ed448, which use the pure (non-prehashed) forms 
specified in TLS 1.3 as "PureEdDSA" algorithms (<xref section="4.2.3" sectionFormat="of" target="RFC8446"/>). 
The SignatureScheme names defined in this document (for example, <tt>mldsa44_ecdsa_secp256r1_sha256</tt>)  mirror the algorithm names in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> (for example, <tt>id-MLDSA44-ECDSA-P256-SHA256</tt>). 
TLS implementors do not need to be aware of these internal details; for a full description of the composite algorithm construction, see Sections 3.2 and 3.3 of 
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>SignatureScheme names are used only as identifiers for negotiation and registry purposes and do not imply TLS-level processing semantics.</t>
      <t>In composite ML-DSA schemes, the SignatureScheme name encodes the PQC component (for example, <tt>mldsa44</tt>), the traditional signature algorithm and curve (for example, <tt>ecdsa_secp256r1</tt>), and the internal prehash function (for example, <tt>sha256</tt>) used by the Composite ML-DSA algorithm prior to generating the individual component signatures, as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. This identification is for algorithm selection and interoperability purposes only and does not imply any TLS-level 
processing of the traditional component.</t>
      <t>The explicit RSA key size (for example, RSA2048, RSA3072, or RSA4096) is included in the SignatureScheme name solely to uniquely identify the composite algorithm and to align with the composite algorithm definitions
in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>Each entry specifies a unique combination of an ML-DSA parameter set (ML-DSA-44, ML-DSA-65, or ML-DSA-87, as defined in <xref target="FIPS204"/>) and a traditional signature algorithm. The mldsa* identifiers refer to the pure ML-DSA variants and MUST NOT be confused with prehashed variants (for example, HashML-DSA-44).</t>
      <t>Sections <xref target="I-D.ietf-lamps-pq-composite-sigs" section="3.2" sectionFormat="bare"/> and <xref target="I-D.ietf-lamps-pq-composite-sigs" section="3.3" sectionFormat="bare"/> of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> define a context string parameter for signing and verification using Composite ML-DSA. When Composite ML-DSA signature algorithms are used in TLS, both
signing and verification MUST use an empty context string. TLS already provides protocol-level domain separation by signing a protocol-specific context string together with the handshake transcript (<xref section="4.4.3" sectionFormat="of" target="RFC8446"/>).</t>
      <t>When a composite ML-DSA signature scheme defined in this document is negotiated, the TLS 1.3 CertificateVerify signing input constructed as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/> is signed using the negotiated composite ML-DSA SignatureScheme, as specified in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>Upon receipt of the CertificateVerify message, the peer MUST verify the signature over the locally constructed signing input using the negotiated composite ML-DSA SignatureScheme, in accordance with <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>When a composite ML-DSA SignatureScheme is negotiated, the end-entity certificate presented in the TLS handshake MUST contain a public key compatible with that SignatureScheme, as specified in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs15_sha256, mldsa65_rsa3072_pkcs15_sha512, and mldsa65_rsa4096_pkcs15_sha512 algorithms, defined 
in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are a restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
      <section anchor="mapping-tls-signatureschemes-to-composite-ml-dsa">
        <name>Mapping TLS SignatureSchemes to Composite ML-DSA</name>
        <t>The following table provides a mapping between the TLS <tt>SignatureScheme</tt>
identifiers defined in this document and the corresponding composite
algorithm identifiers defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        <table>
          <thead>
            <tr>
              <th align="left">TLS SignatureScheme</th>
              <th align="left">Composite ML-DSA Algorithm Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
              <td align="left">id-MLDSA44-ECDSA-P256-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ecdsa_secp256r1_sha512</td>
              <td align="left">id-MLDSA65-ECDSA-P256-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ecdsa_secp384r1_sha512</td>
              <td align="left">id-MLDSA65-ECDSA-P384-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_ecdsa_secp384r1_sha512</td>
              <td align="left">id-MLDSA87-ECDSA-P384-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa44_ed25519_sha512</td>
              <td align="left">id-MLDSA44-Ed25519-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ed25519_sha512</td>
              <td align="left">id-MLDSA65-Ed25519-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_ed448_shake256</td>
              <td align="left">id-MLDSA87-Ed448-SHAKE256</td>
            </tr>
            <tr>
              <td align="left">mldsa44_rsa2048_pss_sha256</td>
              <td align="left">id-MLDSA44-RSA2048-PSS-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa3072_pss_sha512</td>
              <td align="left">id-MLDSA65-RSA3072-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_rsa3072_pss_sha512</td>
              <td align="left">id-MLDSA87-RSA3072-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa4096_pss_sha512</td>
              <td align="left">id-MLDSA65-RSA4096-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_rsa4096_pss_sha512</td>
              <td align="left">id-MLDSA87-RSA4096-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa44_rsa2048_pkcs15_sha256</td>
              <td align="left">id-MLDSA44-RSA2048-PKCS15-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa3072_pkcs15_sha512</td>
              <td align="left">id-MLDSA65-RSA3072-PKCS15-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa4096_pkcs15_sha512</td>
              <td align="left">id-MLDSA65-RSA4096-PKCS15-SHA512</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> need
to be taken into account.</t>
      <t>Traditional signature algorithms such as ECDSA, Ed25519, and Ed448 provide existential unforgeability under chosen-message attack (EUF-CMA), which is sufficient for TLS authentication. When used as the traditional component in a composite construction with ML-DSA, these algorithms contribute to defense-in-depth during the transition to post-quantum cryptography, maintaining TLS authentication security as long as at least one component algorithm remains secure.</t>
      <t>However, composite signature schemes do not in general preserve strong unforgeability (SUF-CMA) once the traditional component algorithm is broken, for example due to the availability of CRQCs. In such cases, a forged traditional signature component can be combined with a valid post-quantum component to produce a composite signature that verifies successfully, violating SUF. This loss of SUF is inherent to the composite construction and does not impact TLS, which requires only EUF-CMA security from its signature schemes.</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. In such scenarios, an attacker with access to a CRQC could forge a traditional server certificate and impersonate the server. If the client continues to accept traditional-only certificates for backward compatibility, it remains exposed to this risk.</t>
      <t>While broader deployment of composite or post-quantum certificates will reduce this exposure, clients remain vulnerable unless stricter authentication continuity policies are enforced. A coordinated “flag day” in which all traditional-only certificates are simultaneously phased out is unlikely due to real-world deployment constraints. The continuity mechanism defined in <xref target="I-D.sheffer-tls-pqc-continuity"/> addresses this deployment challenge by allowing clients to cache and enforce a server’s support for post-quantum or composite authentication, thereby preventing fallback to traditional-only authentication in subsequent connections.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">mldsa65_ecdsa_secp256r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">mldsa44_ed25519_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD6</td>
            <td align="left">mldsa65_ed25519_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD7</td>
            <td align="left">mldsa87_ed448_shake256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD8</td>
            <td align="left">mldsa44_rsa2048_pkcs15_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD9</td>
            <td align="left">mldsa65_rsa3072_pkcs15_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD10</td>
            <td align="left">mldsa65_rsa4096_pkcs15_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD11</td>
            <td align="left">mldsa44_rsa2048_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD12</td>
            <td align="left">mldsa65_rsa3072_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD13</td>
            <td align="left">mldsa87_rsa3072_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD14</td>
            <td align="left">mldsa65_rsa4096_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD15</td>
            <td align="left">mldsa87_rsa4096_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs15_sha256, mldsa65_rsa3072_pkcs15_sha512, and mldsa65_rsa4096_pkcs15_sha512 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite Module-Lattice-Based Digital Signature Algorithm (ML-DSA) for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="April" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST Module-Lattice-Based
   Digital Signature Algorithm (ML-DSA) in hybrid with traditional
   algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519, and Ed448.
   These combinations are tailored to meet regulatory guidelines in
   certain regions.  Composite ML-DSA is applicable in applications that
   use X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where existential unforgeability (EUF-CMA) level
   security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-19"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.sheffer-tls-pqc-continuity">
          <front>
            <title>PQC Continuity: Downgrade Protection for TLS Servers Migrating to PQC</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="1" month="March" year="2026"/>
            <abstract>
              <t>   As the Internet transitions toward post-quantum cryptography (PQC),
   many TLS servers will continue supporting traditional certificates to
   maintain compatibility with legacy clients.  However, this
   coexistence introduces a significant vulnerability: an undetected
   rollback attack, where a malicious actor strips the PQC or Composite
   certificate and forces the use of a traditional certificate once
   quantum-capable adversaries exist.

   To defend against this, this document defines a TLS extension that
   allows a TLS peer (typically a client) to cache another peer's
   (typically a server's) declared commitment to present PQC or
   composite certificates for a specified duration.  On subsequent
   connections, the caching peer enforces that cached commitment and
   rejects traditional-only certificates that conflict with it.  This
   mechanism, inspired by HTTP Strict Transport Security (HSTS) but
   operating at the TLS layer, provides PQC downgrade protection without
   requiring changes to certificate authority (CA) infrastructure.
   Although we expect the more common use case to be clients caching
   server commitments, the mechanism applies symmetrically to server
   caching of client certificate commitments as well.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sheffer-tls-pqc-continuity-01"/>
        </reference>
      </references>
    </references>
    <?line 267?>

<section numbered="false" anchor="rationale-for-a-dedicated-tls-specification-to-be-removed-before-publication">
      <name>Rationale for a Dedicated TLS Specification (to be removed before publication)</name>
      <t>While it might appear sufficient to allocate SignatureScheme code points for composite ML-DSA without a dedicated TLS specification, doing so would leave critical TLS-specific decisions unresolved and risk interoperability failures:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="I-D.ietf-lamps-pq-composite-sigs"/> defines a context string parameter for signing and verification without mandating an empty string for TLS use; implementations could make different choices, causing signature verification failures.</t>
        </li>
        <li>
          <t><xref target="I-D.ietf-lamps-pq-composite-sigs"/> defines both pure and prehashed composite ML-DSA variants; without explicit guidance, implementations could negotiate incompatible modes.</t>
        </li>
        <li>
          <t>RSASSA-PKCS1-v1_5-based composite schemes must be restricted to the <tt>signature_algorithms_cert</tt> extension and must not appear in CertificateVerify messages; this restriction cannot be inferred from code point registration alone.</t>
        </li>
        <li>
          <t>Composite ML-DSA must not be used in TLS 1.2.</t>
        </li>
        <li>
          <t>The LAMPS draft defines a larger set of composite combinations; a TLS specification is needed to define the restricted subset compatible with TLS 1.3.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="implementation-complexity-considerations-to-be-removed-before-publication">
      <name>Implementation Complexity Considerations (to be removed before publication)</name>
      <t>A concern has been raised that composite signatures introduce significant API complexity for TLS implementations. This concern does not apply at the TLS layer. From the TLS perspective, a composite key is treated as a single opaque key — identical in handling to any other signature algorithm. The internal decomposition of a composite key into its ML-DSA and traditional component keys is entirely the responsibility of the underlying cryptographic library, not of the TLS implementation. A TLS implementation that supports composite ML-DSA need only handle the negotiated code points and invoke the crypto engine accordingly; the composite construction is invisible above that boundary.</t>
      <t>Furthermore, the cryptographic library implementing composite ML-DSA can be shared across multiple protocol stacks — including IPsec, JOSE, SSH, and others — meaning the implementation effort is incurred once and benefits multiple protocols. This makes the effective per-protocol cost of supporting composite ML-DSA minimal.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara, Dan Wing, Yaron Sheffer, Samuel Lee, Eric Rescorla, and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
