<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-jose-pqc-kem-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQ KEM for JOSE and COSE">Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) for JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-jose-pqc-kem-05"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Aritra Banerjee">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>aritra.banerjee@nokia.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="December" day="09"/>
    <area>Security</area>
    <workgroup>JOSE</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>JOSE</keyword>
    <keyword>Hybrid</keyword>
    <abstract>
      <?line 113?>

<t>This document describes the conventions for using Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) within JOSE and COSE.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-jose-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        jose Working Group mailing list (<eref target="mailto:jose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/jose/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 117?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Quantum computing is no longer perceived as a consequence of computational sciences and theoretical physics.  Considerable research efforts and enormous corporate and government funding for the development of practical quantum computing systems are being invested currently. As such, as quantum technology advances, there is the potential for future quantum computers to have a significant impact on current cryptographic systems.</t>
      <t>Researchers have developed Post-Quantum Key Encapsulation Mechanisms (PQ-KEMs) to provide secure key establishment resistant against an adversary with access to a quantum computer.</t>
      <t>As the National Institute of Standards and Technology (NIST) is still in the process of selecting the new post-quantum cryptographic algorithms that are secure against both quantum and classical computers, the purpose of this document is to propose a PQ-KEMs to protect the confidentiality of content encrypted using JOSE and COSE against the quantum threat.</t>
      <t>Although this mechanism could thus be used with any PQ-KEM, this document focuses on Module-Lattice-based Key Encapsulation Mechanisms (ML-KEMs). ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient
using the recipient's ML-KEM public key. Three parameters sets for ML-KEMs are specified by <xref target="FIPS203"/>. In order of increasing security strength (and decreasing performance), these parameter sets
are ML-KEM-512, ML-KEM-768, and ML-KEM-1024.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. The following terms are repeately used in this specification:</t>
      <ul spacing="normal">
        <li>
          <t>KEM: Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>PQ-KEM: Post-Quantum Key Encapsulation Mechanism</t>
        </li>
        <li>
          <t>CEK: Content Encryption Key</t>
        </li>
        <li>
          <t>ML-KEM: Module-Lattice-based Key Encapsulation Mechanism</t>
        </li>
      </ul>
      <t>For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of Post-Quantum Algorithm include ML-KEM.</t>
      <section anchor="KEMs">
        <name>Key Encapsulation Mechanisms</name>
        <t>For the purposes of this document, we consider a Key Encapsulation Mechanism (KEM) to be any asymmetric cryptographic scheme comprised of algorithms satisfying the following interfaces <xref target="PQCAPI"/>.</t>
        <ul spacing="normal">
          <li>
            <t>def kemKeyGen() -&gt; (pk, sk)</t>
          </li>
          <li>
            <t>def kemEncaps(pk) -&gt; (ct, ss)</t>
          </li>
          <li>
            <t>def kemDecaps(ct, sk) -&gt; ss</t>
          </li>
        </ul>
        <t>where pk is public key, sk is secret key, ct is the ciphertext representing an encapsulated key, and ss is shared secret.</t>
        <t>KEMs are typically used in cases where two parties, hereby refereed to as the "encapsulater" and the "decapsulater", wish to establish a shared secret via public key cryptography, where the decapsulater has an asymmetric key pair and has previously shared the public key with the encapsulater.</t>
      </section>
    </section>
    <section anchor="rational">
      <name>Design Rationales</name>
      <t>Section 4.6 of the JSON Web Algorithms (JWA) specification, see <xref target="RFC7518"/>, defines two ways of using a key agreement:</t>
      <ul spacing="normal">
        <li>
          <t>When Direct Key Agreement is employed, the shared secret established through the Traditional Algorithm will be the content encryption key (CEK).</t>
        </li>
        <li>
          <t>When Key Agreement with Key Wrapping is employed, the shared secret established through the Traditional Algorithm will wrap the CEK.</t>
        </li>
      </ul>
      <t>For efficient use with multiple recipients, the key wrap approach is used since the content can be encrypted once with the CEK, while each recipient receives an individually encrypted CEK. Similarly, Section 8.5.4 and Section 8.5.5 of COSE <xref target="RFC9052"/> define the Direct Key Agreement and Key Agreement with Key Wrap, respectively. This document proposes the use of PQ-KEMs for these two modes.</t>
      <t>It is essential to note that in the PQ-KEM, one needs to apply Fujisaki-Okamoto <xref target="FO"/> transform or its variant <xref target="HHK"/> on the PQC KEM part to ensure that the overall scheme is IND-CCA2 secure, as mentioned in <xref target="I-D.ietf-tls-hybrid-design"/>. The FO transform is performed using the KDF such that the PQC KEM shared secret achieved is IND-CCA2 secure. As a consequence, one can re-use PQC KEM public keys but there is an upper bound that must be adhered to.</t>
      <t>Note that during the transition from traditional to post-quantum algorithms, there may be a desire or a requirement for protocols that incorporate both types of algorithms until the post-quantum algorithms are fully 
trusted. HPKE <xref target="RFC9180"/> is a KEM that can be extended to support hybrid post-quantum KEMs and the specification for the use of PQ/T Hybrid Key Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE) for integration with JOSE and COSE is described in <xref target="I-D.reddy-cose-jose-pqc-hybrid-hpke"/>.</t>
    </section>
    <section anchor="kem-pqc-algorithms">
      <name>KEM PQC Algorithms</name>
      <t>At time of writing, NIST have standardized three PQC algorithms, with more expected to be standardised in the future (<xref target="NISTFINAL"/>). These algorithms are not necessarily drop-in replacements for traditional asymmetric cryptographic algorithms. For instance, RSA <xref target="RSA"/> and ECC <xref target="RFC6090"/> can be used as both a key encapsulation method (KEM) and as a signature scheme, whereas there is currently no post-quantum algorithm that can perform both functions.</t>
      <section anchor="ml-kem">
        <name>ML-KEM</name>
        <t>ML-KEM offers several parameter sets with varying levels of security and performance trade-offs. This document specifies the use of the ML-KEM algorithm at three security levels: ML-KEM-512, ML-KEM-768, and ML-KEM-1024. ML-KEM key generation, encapsulation and decaspulation functions are defined in <xref target="FIPS203"/>. The main security property for KEMs standardized in the NIST Post-Quantum Cryptography Standardization Project is indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) (see Section 10.2 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). The public/private key sizes, ciphertext key size, and PQ security levels of ML-KEM are detailed in Section 12 of <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      </section>
      <section anchor="encrypt">
        <name>PQ-KEM Encapsulation</name>
        <t>The encapsulation process is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Generate an inital shared secret SS' and the associated ciphertext CT
using the KEM encapsulation function and the recipient's public
key recipPubKey.</t>
          </li>
        </ol>
        <artwork><![CDATA[
          (SS', CT) = kemEncaps(recipPubKey)
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>Derive a final shared secret SS of length SSLen bytes from
the initial shared secret SS' using the underlying key derivation
function:</t>
          </li>
        </ol>
        <artwork><![CDATA[
          SS = KDF(SS', SSLen)
]]></artwork>
        <t>In Direct Key Agreement mode, the output of the KDF <bcp14>MUST</bcp14> be a key of the same length as that used by encryption algorithm. In Key Agreement with Key Wrapping mode, the output of the KDF <bcp14>MUST</bcp14> be a key of the length needed for the specified key wrap algorithm.</t>
        <t>When Direct Key Agreement is employed, SS is the CEK. When Key Agreement with Key Wrapping is employed, SS is used to wrap the CEK.</t>
      </section>
      <section anchor="decrypt">
        <name>PQ-KEM Decapsulation</name>
        <t>The decapsulation process is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Decapsulate the ciphertext CT using the KEM decapsulation
function and the recipient's private key to retrieve the initial shared
secret SS':</t>
          </li>
        </ol>
        <artwork><![CDATA[
          SS' = kemDecaps(recipPrivKey, CT)
]]></artwork>
        <artwork><![CDATA[
If the decapsulation operation outputs an error, output "decryption error", and stop.
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>Derive the final shared secret SS of length SSLen bytes from
the inital secret SS' using the underlying key derivation
function:</t>
          </li>
        </ol>
        <artwork><![CDATA[
          SS = KDF(SS', SSLen)
]]></artwork>
      </section>
    </section>
    <section anchor="kdf">
      <name>KDF</name>
      <section anchor="key-derivation-for-jose">
        <name>Key Derivation for JOSE</name>
        <t>The key derivation for JOSE is performed using the KMAC defined in NIST SP 800-108r1-upd1 <xref target="SP-800-108r1"/>. The KMAC(K, X, L, S) parameters are instantiated as follows:</t>
        <ul spacing="normal">
          <li>
            <t>K: the input key-derivation key. In this document this is the initial shared secret (SS') outputted from the 
kemEncaps() or kemDecaps() functions.</t>
          </li>
          <li>
            <t>X: The context-specific data used for key derivation includes the concatenation of AlgorithmID, SuppPubInfo, and SuppPrivInfo, as defined in <xref target="NIST.SP.800-56Ar3"/>. The fields AlgorithmID and SuppPubInfo 
   are defined in Section 4.6.2 of <xref target="RFC7518"/> The fields PartyUInfo and PartyVInfo, also defined in that section, are intentionally excluded. PartyUInfo is omitted because post-quantum KEMs do not support sender authentication. PartyVInfo is excluded because the recipient’s identity is already bound to the public key used for encapsulation, making its inclusion unnecessary. If mutually known private information is required, both parties <bcp14>MUST</bcp14> agree out-of-band to include it as SuppPrivInfo.</t>
          </li>
          <li>
            <t>L: length of the output key in bits and it would be set to match the length of the key required for the AEAD operation.</t>
          </li>
          <li>
            <t>S: the optional customization label. In this document this parameter is unused, that is it is the zero-length string "".</t>
          </li>
        </ul>
        <t>For all security levels of ML-KEM, KMAC256 is used.</t>
      </section>
      <section anchor="key-derivation-for-cose">
        <name>Key Derivation for COSE</name>
        <t>The key derivation for COSE is performed using the KMAC defined in NIST SP 800-108r1-upd1 <xref target="SP-800-108r1"/>. The KMAC(K, X, L, S) parameters are instantiated as follows:</t>
        <ul spacing="normal">
          <li>
            <t>K: the input key-derivation key. In this document this is the initial shared secret (SS') outputted from the 
kemEncaps() or kemDecaps() functions.</t>
          </li>
          <li>
            <t>X: The context structure defined in Section 5.2 of <xref target="RFC9053"/> excluding PartyUInfo and PartyVInfo fields. PartyUInfo is omitted because sender authentication is not available in PQ KEMs. PartyVInfo is excluded because the recipient's identity is already bound to the public key used for encapsulation, making its inclusion redundant. If mutually known private information is to be included, both the sender and the recipient <bcp14>MUST</bcp14> agree out-of-band to include it as SuppPrivInfo in the key derivation function, as defined in <xref target="NIST.SP.800-56Ar3"/>.</t>
          </li>
          <li>
            <t>L: length of the output key in bits and it would be set to match the length of the key required for the AEAD operation.</t>
          </li>
          <li>
            <t>S: the optional customization label. In this document this parameter is unused, that is it is the zero-length string "".</t>
          </li>
        </ul>
        <t>For all security levels of ML-KEM, KMAC256 is used.</t>
      </section>
    </section>
    <section anchor="post-quantum-kem-in-jose">
      <name>Post-quantum KEM in JOSE</name>
      <t>As explained in <xref target="rational"/> JWA defines two ways to use public key cryptography with JWE:</t>
      <ul spacing="normal">
        <li>
          <t>Direct Key Agreement</t>
        </li>
        <li>
          <t>Key Agreement with Key Wrapping</t>
        </li>
      </ul>
      <t>This specification describes these two modes of use for PQ-KEM in JWE. Unless otherwise stated, no changes to the procedures described in <xref target="RFC7516"/> have been made.</t>
      <section anchor="direct-key-agreement">
        <name>Direct Key Agreement</name>
        <ul spacing="normal">
          <li>
            <t>The "alg" header parameter <bcp14>MUST</bcp14> be a PQ-KEM algorithm chosen from the JSON Web Signature and Encryption Algorithms registry defined in <xref target="JOSE-IANA"/>.</t>
          </li>
          <li>
            <t>The CEK will be generated using the process explained in <xref target="encrypt"/>. The output of the <xref target="encrypt"/> <bcp14>MUST</bcp14> be a secret key of the same length as that used by the "enc" algorithm.</t>
          </li>
          <li>
            <t>The usage for the "alg" and "enc" header parameters remain the same as in JWE <xref target="RFC7516"/>. Subsequently, the plaintext will be encrypted using the CEK, as detailed in Step 15 of Section 5.1 of <xref target="RFC7516"/>.</t>
          </li>
          <li>
            <t>The header parameter encapsulated key "ek" defined in <xref target="I-D.ietf-jose-hpke-encrypt"/> <bcp14>MUST</bcp14> include the output ('ct') from the PQ-KEM algorithm, encoded using base64url.</t>
          </li>
          <li>
            <t>The recipient <bcp14>MUST</bcp14> base64url decode the ciphertext from the "ek" header parameter and then use it to derive the CEK using the process defined in <xref target="decrypt"/>.</t>
          </li>
          <li>
            <t>The JWE Encrypted Key <bcp14>MUST</bcp14> be absent.</t>
          </li>
        </ul>
        <t>Note that when using Direct Key Agreement in JOSE Compact Serialization, inefficiency arises due to double encoding of the KEM ciphertext. In this mode, the "epk" parameter inside the protected header carries the KEM ciphertext, already base64url-encoded. Then, the entire protected header is base64url-encoded again as part of the compact serialization.</t>
      </section>
      <section anchor="key-agreement-with-key-wrapping">
        <name>Key Agreement with Key Wrapping</name>
        <ul spacing="normal">
          <li>
            <t>The derived key is generated using the process explained in <xref target="encrypt"/> and used to encrypt the CEK.</t>
          </li>
          <li>
            <t>The parameter "ek" <bcp14>MUST</bcp14> include the output ('ct') from the PQ-KEM algorithm, encoded using base64url.</t>
          </li>
          <li>
            <t>The JWE Encrypted Key <bcp14>MUST</bcp14> include the base64url-encoded encrypted CEK.</t>
          </li>
          <li>
            <t>The 'enc' (Encryption Algorithm) header parameter <bcp14>MUST</bcp14> specify a content encryption algorithm from the JSON Web Signature and Encryption Algorithms registry, as defined in <xref target="JOSE-IANA"/>.</t>
          </li>
          <li>
            <t>The recipient <bcp14>MUST</bcp14> base64url decode the ciphertext from "ek". Subsequently, it is used to derive the key, through the process defined in <xref target="decrypt"/>. The derived key will then be used to decrypt the CEK.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="post-quantum-kem-in-cose">
      <name>Post-Quantum KEM in COSE</name>
      <t>This specification supports two uses of PQ-KEM in COSE, namely</t>
      <ul spacing="normal">
        <li>
          <t>PQ-KEM in a Direct Key Agreement mode.</t>
        </li>
        <li>
          <t>PQ-KEM in a Key Agreement with Key Wrap mode.</t>
        </li>
      </ul>
      <t>In both modes, the COSE header parameter 'ek' defined in Section 7.2 of <xref target="I-D.ietf-cose-hpke"/>, 
is used to convey the output ('ct') from the PQ KEM Encaps algorithm.</t>
      <section anchor="direct-key-agreement-1">
        <name>Direct Key Agreement</name>
        <t>The CEK will be generated using the process explained in <xref target="encrypt"/>. 
Subsequently, the plaintext will be encrypted using the CEK. The resulting 
ciphertext is either included in the COSE_Encrypt or is detached. If a payload is
transported separately then it is called "detached content". A nil CBOR
object is placed in the location of the ciphertext. See Section 5
of <xref target="RFC9052"/> for a description of detached payloads.</t>
        <t>The COSE_Recipient structure for the recipient is organized as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The sender <bcp14>MUST</bcp14> set the 'alg' parameter to indicate the use of the PQ-KEM algorithm.</t>
          </li>
          <li>
            <t>This documents RECOMMENDS the use of the 'kid' parameter
(or other parameters) to explicitly identify the recipient public key
used by the sender. If the COSE_Encrypt contains the 'kid' then the recipient may
use it to select the appropriate private key.</t>
          </li>
        </ul>
      </section>
      <section anchor="key-agreement-with-key-wrap">
        <name>Key Agreement with Key Wrap</name>
        <t>With the two layer structure the PQ-KEM information is conveyed in the COSE_recipient 
structure, i.e. one COSE_recipient structure per recipient.</t>
        <t>In this approach the following layers are involved:</t>
        <ul spacing="normal">
          <li>
            <t>Layer 0 (corresponding to the COSE_Encrypt structure) contains the content (plaintext)
encrypted with the CEK. This ciphertext may be detached, and if not detached, then
it is included in the COSE_Encrypt structure.</t>
          </li>
          <li>
            <t>Layer 1 (corresponding to a recipient structure) contains parameters needed for 
PQ-KEM to generate a shared secret used to encrypt the CEK. This layer conveys<br/>
the encrypted CEK in the "ciphertext" field (Section 5.1 of <xref target="RFC9052"/>). 
The unprotected header <bcp14>MAY</bcp14> contain the kid parameter to identify the static recipient 
public key the sender has been using with PQ-KEM.</t>
          </li>
        </ul>
        <t>This two-layer structure is used to encrypt content that can also be shared with
multiple parties at the expense of a single additional encryption operation.
As stated above, the specification uses a CEK to encrypt the content at layer 0.</t>
      </section>
    </section>
    <section anchor="JOSE-PQ-KEM">
      <name>JOSE Ciphersuite Registration</name>
      <t>This specification registers a number of PQ-KEM algorithms for use with JOSE.</t>
      <t>All security levels of ML-KEM internally utilize SHA3-256, SHA3-512, SHAKE128, and SHAKE256. This internal usage influences the selection of the KDF as described in this document.</t>
      <t>ML-KEM-512 <bcp14>MUST</bcp14> be used with a KDF capable of outputting a key with at least 128 bits of security and with a key wrapping algorithm with a key length of at least 128 bits.</t>
      <t>ML-KEM-768 <bcp14>MUST</bcp14> be used with a KDF capable of outputting a key with at least 192 bits of security and with a key wrapping algorithm with a key length of at least 192 bits.</t>
      <t>ML-KEM-1024 <bcp14>MUST</bcp14> be used with a KDF capable of outputting a key with at least 256 bits of security and with a key wrapping algorithm with a key length of at least 256 bits.</t>
      <ul spacing="normal">
        <li>
          <t>In Direct key agreement, the parameter "alg" <bcp14>MUST</bcp14> be specified, and its value <bcp14>MUST</bcp14> be one of the values specified in <xref target="direct-table"/>. (Note that future specifications <bcp14>MAY</bcp14> extend the list of algorithms.)</t>
        </li>
      </ul>
      <figure anchor="direct-table">
        <name>Direct Key Agreement: Algorithms.</name>
        <artwork><![CDATA[
 +===============================+===================================+
 | alg                           | Description                       |
 +===============================+===================================+
 | ML-KEM-512                    | ML-KEM-512                        |
 +===============================+===================================+
 | ML-KEM-768                    | ML-KEM-768                        |
 +===============================+===================================+
 | ML-KEM-1024                   | ML-KEM-1024                       |
 +===============================+===================================+
]]></artwork>
      </figure>
      <ul spacing="normal">
        <li>
          <t>In Key Agreement with Key Wrapping, the parameter "alg" <bcp14>MUST</bcp14> be specified, and its value <bcp14>MUST</bcp14> be one of the values specified in the table <xref target="keywrap-table"/>.</t>
        </li>
      </ul>
      <figure anchor="keywrap-table">
        <name>Key Agreement with Key Wrapping: Algorithms.</name>
        <artwork><![CDATA[
 +=================================+===================================+
 | alg                             | Description                       |
 +=================================+===================================+
 | ML-KEM-512+A128KW               | ML-KEM-512 + AES128KW             |
 +=================================+===================================+
 | ML-KEM-768+A192KW               | ML-KEM-768 + AES192KW             |
 +=================================+===================================+
 | ML-KEM-1024+A256KW              | ML-KEM-1024 + AES256KW            |
 +=================================+===================================+
]]></artwork>
      </figure>
    </section>
    <section anchor="COSE-PQ-KEM">
      <name>COSE Ciphersuite Registration</name>
      <t><xref target="mapping-table"/> maps the JOSE algorithm names to the COSE algorithm values (for the PQ-KEM ciphersuites defined by this document).</t>
      <figure anchor="mapping-table">
        <name>Mapping between JOSE and COSE PQ-KEM Ciphersuites.</name>
        <artwork><![CDATA[
+===============================+=========+===================================+=============+
| JOSE                          | COSE ID | Description                       | Recommended |
+===============================+=========+===================================+=============+
| ML-KEM-512                    | TBD1    | ML-KEM-512                        | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| ML-KEM-768                    | TBD2    | ML-KEM-768                        | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| ML-KEM-1024                   | TBD3    | ML-KEM-1024                       | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| ML-KEM-512+A128KW             | TBD4    | ML-KEM-512 + AES128KW             | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| ML-KEM-768+A192KW             | TBD5    | ML-KEM-768 + AES192KW             | No          |
+-------------------------------+---------+-----------------------------------+-------------+
| ML-KEM-1024+A256KW            | TBD6    | ML-KEM-1024 + AES256KW            | No          |
+-------------------------------+---------+-----------------------------------+-------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="use-of-akp-key-type-for-pqc-kem-keys-in-jose-and-cose">
      <name>Use of AKP Key Type for PQC KEM Keys in JOSE and COSE</name>
      <t>The "AKP" (Algorithm Key Pair) key type, defined in <xref target="I-D.ietf-cose-dilithium"/> is used in this specification to
represent PQC KEM keys for JOSE and COSE. When used with JOSE or COSE algorithms that rely on PQC KEMs, a key with "kty" set to "AKP" represents an PQC KEM key pair. The public key is carried in the "pub" parameter. If included, the private key is carried in the "priv" parameter. When expressed as a JWK, the "pub" and "priv" values are base64url-encoded.</t>
      <t>The "AKP" key type mandates inclusion of the "alg" parameter, and applying AKP to PQC KEMs requires distinguishing between keys used for Direct Key Agreement and those used for Key Agreement with Key Wrap, which is in line with <xref target="NIST.SP.800-57pt1r5"/> guidance. Note that the NIST guidance refers to using a key for a single purpose, and both KEM and KEM+KW fall under the same overall purpose of key establishment. In this draft, they are treated as distinct algorithm usages to ensure clear operational separation.</t>
      <t>For ML-KEM algorithms, as specified in <xref target="FIPS203"/>, there are two possible representations of a private key: a seed and a fully expanded private key derived from the seed. This document specifies the use of only the seed form for private keys. To promote interoperability, this specification mandates that the "priv" parameter <bcp14>MUST</bcp14> contain the 32-byte seed used to generate the ML-KEM key pair. It does not support the expanded private key representation defined by NIST. This approach ensures consistency with other PQC algorithms used in JOSE/COSE, and avoids ambiguity.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC KEMs used in the manner described in this document <bcp14>MUST</bcp14> explicitly be designed to be secure in the event that the public key is reused, such as achieving IND-CCA2 security. ML-KEM has such security properties.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="jose">
        <name>JOSE</name>
        <t>The following entries are added to the "JSON Web Signature and Encryption Algorithms" registry:</t>
        <ul spacing="normal">
          <li>
            <t>Algorithm Name: ML-KEM-512</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-512 PQ-KEM.</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: ML-KEM-768</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-768 PQ-KEM.</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: ML-KEM-1024</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-1024 PQ-KEM.</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: ML-KEM-512+A128KW</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-512 PQ-KEM and CEK wrapped with "A128KW".</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: ML-KEM-768+A192KW</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-768 and CEK wrapped with "A192KW".</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
          <li>
            <t>Algorithm Name: ML-KEM-1024+A256KW</t>
          </li>
          <li>
            <t>Algorithm Description: PQ-KEM that uses ML-KEM-1024 and CEK wrapped with "A256KW".</t>
          </li>
          <li>
            <t>Algorithm Usage Location(s): "alg"</t>
          </li>
          <li>
            <t>JOSE Implementation Requirements: Optional</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): [[TBD: This RFC]]</t>
          </li>
          <li>
            <t>Algorithm Analysis Documents(s): TODO</t>
          </li>
        </ul>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <t>The following has to be added to the "COSE Algorithms" registry:</t>
        <ul spacing="normal">
          <li>
            <t>Name: ML-KEM-512</t>
          </li>
          <li>
            <t>Value: TBD1</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-512 PQ-KEM.</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: ML-KEM-768</t>
          </li>
          <li>
            <t>Value: TBD2</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-768 PQ-KEM.</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: ML-KEM-768</t>
          </li>
          <li>
            <t>Value: TBD3</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-1024 PQ-KEM.</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: ML-KEM-512+A128KW</t>
          </li>
          <li>
            <t>Value: TBD4</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-512 PQ-KEM and CEK wrapped with "A128KW".</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: ML-KEM-768+192KW</t>
          </li>
          <li>
            <t>Value: TBD5</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-768 and CEK wrapped with "A192KW".</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
          <li>
            <t>Name: ML-KEM-1024+A256KW</t>
          </li>
          <li>
            <t>Value: TBD6</t>
          </li>
          <li>
            <t>Description: PQ-KEM that uses ML-KEM-1024 and CEK wrapped with "A256KW".</t>
          </li>
          <li>
            <t>Capabilities: [kty]</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: This document (TBD)</t>
          </li>
          <li>
            <t>Recommended: No</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors thank AJITOMI Daisuke, Brian Campbell, Daniel Huigens, Filip Skokan, Ilari Liusvaara, Neil Madden, 
and Stepan Yakimovich for their contributions to this specification.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7516">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="JOSE-IANA" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Web Signature and Encryption Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JOSE-IANA-Curves" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Web Key Elliptic Curve</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="COSE-IANA-Curves" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Elliptic Curves</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-jose-hpke-encrypt">
          <front>
            <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="30" month="November" year="2025"/>
            <abstract>
              <t>   This specification defines how to use Hybrid Public Key Encryption
   (HPKE) with JSON Web Encryption (JWE).  HPKE enables public key
   encryption of arbitrary-sized plaintexts to a recipient's public key,
   and provides security against adaptive chosen ciphertext attacks.
   This specification chooses a specific subset of the HPKE features to
   use with JWE.

   This specification updates RFC 7516 (JWE) to enable use of the
   Integrated Encryption Key Establishment Mode.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-jose-hpke-encrypt-15"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQCAPI" target="https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/example-files/api-notes.pdf">
          <front>
            <title>PQC - API notes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FO" target="https://link.springer.com/article/10.1007/s00145-011-9114-1">
          <front>
            <title>Secure Integration of Asymmetric and Symmetric Encryption Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HHK" target="https://link.springer.com/chapter/10.1007/978-3-319-70500-2_12">
          <front>
            <title>A Modular Analysis of the Fujisaki-Okamoto Transformation</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>FIPS-203: Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SP-800-108r1" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1-upd1.pdf">
          <front>
            <title>Recommendation for Key Derivation Using Pseudorandom Functions</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="NISTFINAL" target="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">
          <front>
            <title>NIST Releases First 3 Finalized Post-Quantum Encryption Standards</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RSA" target="https://dl.acm.org/doi/pdf/10.1145/359340.359342">
          <front>
            <title>A Method for Obtaining Digital Signatures and Public-Key Cryptosystems+</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="NIST.SP.800-56Ar3" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, NIST Special Publication 800-56A Revision 3</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="NIST.SP.800-57pt1r5" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf">
          <front>
            <title>Recommendation for Key Management, Part 1 – General, NIST Special Publication 800-57 Part 1 Revision 5</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.reddy-cose-jose-pqc-hybrid-hpke">
          <front>
            <title>PQ/T Hybrid KEM: HPKE with JOSE/COSE</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document outlines the construction of a PQ/T Hybrid Key
   Encapsulation Mechanism (KEM) in Hybrid Public-Key Encryption (HPKE)
   for integration with JOSE and COSE.  It specifies the utilization of
   both traditional and Post-Quantum Cryptography (PQC) algorithms,
   referred to as PQ/T Hybrid KEM, within the context of JOSE and COSE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-cose-jose-pqc-hybrid-hpke-08"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="I-D.ietf-cose-hpke">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Ajitomi, Daisuke" initials="A." surname="Daisuke">
              <organization>bibital</organization>
            </author>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE is a general encryption framework utilizing an asymmetric key
   encapsulation mechanism (KEM), a key derivation function (KDF), and
   an Authenticated Encryption with Associated Data (AEAD) algorithm.

   This document defines the use of HPKE with COSE.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by the
   pre-shared key authenticated variant of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-hpke-18"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="15" month="November" year="2025"/>
            <abstract>
              <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
