<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="PQC Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-07"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="01"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 86?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document specifies a generic mechanism for integrating post-quantum cryptographic (PQC) digital signature algorithms into the IKEv2 protocol. The approach allows for seamless inclusion of any PQC signature scheme within the existing authentication framework of IKEv2. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol, as they have been standardized by NIST.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 92?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec. In the IKE_AUTH exchange, the initiator and responder independently select and use their preferred authentication method, which may differ between peers. The most common authentication method is digital signatures using asymmetric cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC4754"/>,
and Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8420"/>.</t>
      <t>The existence of a Cryptographically Relevant Quantum Computer (CRQC) would render traditional asymmetric algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the existence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are asymmetric algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines a general approach to incorporating PQC digital signature algorithms into IKEv2 while maintaining interoperability and backward compatibility, as it does not change the IKEv2 protocol but adds negotiable PQC signature algorithms. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> can be employed as authentication methods within IKEv2, as they have been standardized the US National Institute of Standards and Technology (NIST) PQC project.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in Terminology for Post-Quantum Traditional Hybrid Schemes <xref target="RFC9794"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="general-framework-for-pqc-authentication-in-ikev2">
      <name>General Framework for PQC Authentication in IKEv2</name>
      <t>IKEv2 authentication commonly relies on digital signatures to verify the identity of communicating peers. The mechanism described in this document enables the use of any PQC digital signature algorithm without modifying core IKEv2 operations.</t>
      <section anchor="specifying-pqc-signature-algorithms">
        <name>Specifying PQC Signature Algorithms</name>
        <ul spacing="normal">
          <li>
            <t>IKEv2 can use arbitrary signature algorithms as described in Signature Authentication in IKEv2 <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. Any PQC digital signature algorithm can be incorporated using the "Signature Algorithm" field in authentication payloads, as defined in <xref target="RFC7427"/>.</t>
          </li>
          <li>
            <t>DER encoded AlgorithmIdentifier ASN.1 objects will be used to uniquely identify PQC signature algorithm scheme and the parameter set associated with it.</t>
          </li>
        </ul>
      </section>
      <section anchor="sig">
        <name>Signature Generation and Verification</name>
        <t>PQC signatures may be generated in either deterministic or hedged modes. The terms deterministic and hedged used in this document are in accordance with ML-DSA <xref target="FIPS204"/> and SLH-DSA <xref target="FIPS205"/>, which define the ML-DSA and SLH-DSA algorithms. Future PQC signature algorithms may adopt different nomenclature, but will be expected to follow the same principles.</t>
        <t>In the deterministic mode, the signature is derived entirely from the message and the signer’s private key, without introducing fresh randomness at signing time. While this eliminates reliance on an external random number generator (RNG), it increases susceptibility to side-channel attacks, particularly fault injection attacks.</t>
        <t>The hedged mode provides some resistance against this risk by including precomputed randomness in the signer's private key and incorporating fresh randomness generated at signing time.
This foils some side channel attack approaches, while adding no additional strength against others.
If protection against side-channel attacks are required, an ML-DSA implementation that implements side-channel resistance should be used.</t>
        <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each session, as it includes session-specific information such as nonces. PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between deterministic and hedged signing modes does not impact interoperability because the verification process remains the same for both variants.</t>
        <t>If the PQC signature algorithm uses a 'context' input parameter, it <bcp14>MUST</bcp14> be set to an empty string.</t>
        <t>Certain digital signature algorithms support two modes: "pure" mode and "pre-hash" mode. For example, ML-DSA and
SLH-DSA support both modes. In pure mode, the content is signed directly along with some domain separation
information. In contrast, pre-hash mode involves signing a digest of the message. This document specifies the use
of pure mode for signature-based authentication in IKEv2, where the message is signed directly along with domain separation information. The data used for authentication in IKEv2, as described in Section 2.15 of IKEv2 <xref target="RFC7296"/>, consists of elements such as nonces, SPIs, and initial exchange messages (messages preceding IKE_AUTH), which are typically within device memory constraints.</t>
        <section anchor="handsig">
          <name>Handling PQC Signatures in IKEv2</name>
          <t>As specified in Signature Authentication in IKEv2 <xref target="RFC7427"/>, both the initiator and responder <bcp14>MUST</bcp14> send the SIGNATURE_HASH_ALGORITHMS notify payload in the IKE_SA_INIT exchange to indicate the set of hash algorithms they support for signature generation and verification. The SIGNATURE_HASH_ALGORITHMS notify payload contains a list of 2-octet hash algorithm identifiers, defined in the IANA "IKEv2 Hash Algorithms" registry.</t>
          <t>For PQC signature algorithms that inherently operate directly on the raw message without hashing, such as ML-DSA and SLH-DSA, only the 'Identity' hash function is applicable. The 'Identity' hash function (value 5) is defined in Section 2 of using EdDSA in IKEv2 <xref target="RFC8420"/> and indicates that the input message is used as-is, without any hash function applied. Therefore, implementations supporting such PQC signature algorithms <bcp14>MUST</bcp14> include the 'Identity' hash (5) in the SIGNATURE_HASH_ALGORITHMS notify. Furthermore, PQC signature algorithms requiring the 'Identity' hash <bcp14>MUST NOT</bcp14> be used with a peer that has not indicated support for the Identity hash in its notify payload.</t>
          <t>When generating a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signer as the message to be signed (with empty context string, if applicable). The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
          <t>When verifying a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signature verifier as the message to be verified (with empty context string, if applicable).</t>
          <t>IKEv2 peers supporting the PQC authentication mechanism defined in this specification <bcp14>SHOULD</bcp14> implement IKEv2 message fragmentation <xref target="RFC7383"/>, unless IKEv2 runs over a reliable transport (e.g., <xref target="RFC9329"/>) or the underlying network is known to support sufficiently large MTUs without fragmentation issues, since PQC public keys and signatures can be significantly larger than those used in traditional algorithms. 
For example, ML-DSA-44 requires a public key of 1,312 bytes and a signature of 2,420 bytes, while even the smallest SLH-DSA signature is around 7,856 bytes. As guidance, IKEv2 peers should assume a minimum PMTU of 1280 bytes for IPv6 (per <xref target="RFC8200"/>) and, where legacy IPv4 networks are a consideration, an effective MTU of 576 bytes for IPv4 (per <xref target="RFC1122"/>).</t>
        </section>
      </section>
      <section anchor="mechanisms-for-signaling-supported-key-pair-types">
        <name>Mechanisms for Signaling Supported Key Pair Types</name>
        <t>The following mechanisms can be used by peers to signal the types of digital signature algorithms and parameters they support:</t>
        <ul spacing="normal">
          <li>
            <t>Certificate Request Payload: One method to ascertain that the key pair type the <br/>
initiator wants the responder to use is through a Certificate Request payload (defined in Section 3.7 of IKEv2 <xref target="RFC7296"/>) sent by the initiator. For example, the initiator can specify that it trusts certificates issued by a certificate authority (CA) that signs with a particular post-quantum cryptographic (PQC) signature algorithm. This implies that the initiator can process signatures generated using that algorithm, thereby allowing the responder to authenticate itself using a key pair associated with the specified PQC signature scheme.</t>
          </li>
          <li>
            <t>Authentication Method Announcement: Using Announcing Supported Authentication Method in IKEv2 <xref target="RFC9593"/>, which enables peers to declare their supported authentication methods. This improves interoperability when IKEv2 peers are configured with multiple credential types of different type to authenticate each other. The responder includes a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message, listing the  signature scheme(s) it supports under the Digital Signature authentication method. The initiator includes the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or in the IKE_INTERMEDIATE request. This notification lists the digital signature scheme(s) supported by the initiator, ordered by preference.</t>
          </li>
        </ul>
        <t>In traditional IKEv2 deployments, peers often implicitly know the signature algorithms in use based on pre-configured certificates, trusted CAs, and IKEv2 policies. However, cryptographic agility, the ability to negotiate and use different cryptographic algorithms is gaining increased attention for ensuring long-term security and interoperability. This requirement becomes even more relevant with the introduction of PQC algorithms, where multiple signature algorithms with varying security levels and performance characteristics may need to be supported over time.</t>
      </section>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky that leverages rejection sampling to render lattice- based FS schemes compact and secure. ML-DSA uses a uniform distribution over small integers for computing coefficients in error vectors, which simplifies implementation compared to schemes requiring discrete Gaussian sampling.</t>
      <t>ML-DSA is instantiated with three parameter sets for the security categories 2, 3, and 5 (see Table 2 in Section 10 of PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>). Security properties of ML-DSA are discussed in Section 9 of PKIX Algorithm Identifiers for ML-DSA <xref target="RFC9881"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87. The DER encodings of the AlgorithmIdentifier objects for ML-DSA-44, ML-DSA-65, and ML-DSA-87 are listed in <xref target="ASN"/>.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms such as XMSS <xref target="RFC8391"/> or HSS/LMS <xref target="RFC8554"/>, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide AES-128, AES-192, and AES-256 bits of security respectively (see Table 2 in Section 10 of PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>). This document specifies the use of the SLH-DSA algorithm in IKEv2 at each level.</t>
      <t>Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained  IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and both SHA-256 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels. Those hash function selections are internal to SLH-DSA implementations, and are not to be confused with those in the SIGNATURE_HASH_ALGORITHMS notification payload.</t>
      <t>ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme in the face of a CRQC. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
      <t>The DER encodings of the AlgorithmIdentifier objects for each SLH-DSA variant are listed in <xref target="ASN"/>.</t>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and hedged signing modes. By default, ML-DSA uses a hedged approach, where the random value rnd is a 256-bit string generated by an Random Bit Generator (RBG). The signature generation function utilizes this randomness along with the private key and the preprocessed message.
In the deterministic variant, rnd is instead set to a constant 256-bit zero string. Similarly, SLH-DSA can operate in either deterministic or hedged mode. The mode is determined by the value of opt_rand, when opt_rand is set to a fixed value (e.g., the public seed from the public key), SLH-DSA generates deterministic signatures, ensuring that signing the same message twice produces the same signature. In hedged mode, opt_rand is a fresh random value, introducing additional entropy to enhance security and mitigate potential side-channel risks.</t>
      <t>IKEv2 peers can use either the hedged or deterministic variants of ML-DSA and SLH-DSA for authentication in IKEv2, with a preference for using the hedged mode (<xref target="sig"/>).</t>
      <t>The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in NIST <xref target="CSOR"/> and referenced in PKIX Algorithm Identifiers for the ML-DSA <xref target="RFC9881"/>. <xref target="FIPS204"/> defines both a pure and a pre-hash variant of ML-DSA, but PKIX Algorithm Identifiers for the ML-DSA <xref target="RFC9881"/> specifies only the pure variant.</t>
      <t>The different parameter sets of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in NIST <xref target="CSOR"/> and referenced in PKIX Algorithm
Identifiers for the SLH-DSA <xref target="RFC9909"/>. <xref target="FIPS205"/> defines two signature modes: pure mode and pre-hash mode. PKIX Algorithm Identifiers for the SLH-DSA <xref target="RFC9909"/> specifies the use of both Pure SLH-DSA and HashSLH-DSA in Public Key Infrastructure X.509 (PKIX) certificates and Certificate Revocation Lists (CRLs).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC signature algorithms are generally modeled to achieve strong unforgeability under adaptive chosen-message attacks (SUF-CMA; see Section 10.1.1 of PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>). For example, ML-DSA provides SUF-CMA security. However, some algorithms, such as SLH-DSA, achieve existential unforgeability under chosen-message attacks (EUF-CMA; see Section 10.1.1 of PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>). This distinction does not impact IKEv2, as the signed data in each session is unique due to the inclusion of nonces. Consequently, the oracle-based forgery attack scenarios in the EUF-CMA model do not arise in IKEv2.</t>
      <t>Different PQC signature schemes are designed to provide security levels comparable to well-established cryptographic primitives. For example, some schemes align with the NIST post-quantum security categories (Categories 1 through 5) as discussed in ML-DSA  <xref target="FIPS204"/> and SLH-DSA <xref target="FIPS205"/>. These categories specify target security strengths that correspond approximately to exhaustive key-search resistance for AES-128, AES-192, and AES-256, and collision-search resistance for SHA-256, SHA-384, and SHA-512. The choice of a PQC signature algorithm should be guided by the desired security level and performance requirements.</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256 collision resistance (which is a harder problem than AES-128 key search), AES-192 key search, and AES-256 key search, respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of PKIX Algorithm Identifiers for ML-DSA <xref target="RFC9881"/> and PKIX Algorithm Identifiers for SLH-DSA <xref target="RFC9909"/> apply to this specification as well.</t>
      <t>SLH-DSA keys are limited to 2^64 signatures. This upper bound is so large that even a IKEv2 server establishing IKEv2 sessions at an extremely high rate could not realistically reach it (at 10 billion signatures per second, it would still take over 58 years). The limit is therefore of theoretical interest only, but implementations may still track signature usage as a precautionary security measure. ML-DSA does not have a built-in signature limit, allowing for an arbitrary number of signatures to be made with the same key.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, Dan Wing, Wang Guilin, Rebecca Guthrie, Jonathan Hammell, John Mattsson, Tero Kivinen
and Daniel Van Geest and Tero Kivinen for the discussion and comments.</t>
      <!-- Start of Appendices -->

</section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CSOR" target="https://csrc.nist.gov/projects/computer-security-objects-register/algorithm-registration">
          <front>
            <title>Computer Security Objects Register</title>
            <author initials="" surname="NIST" fullname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2024" month="August" day="20"/>
          </front>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7383">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages. This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4754">
          <front>
            <title>IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="D. Fu" initials="D." surname="Fu"/>
            <author fullname="J. Solinas" initials="J." surname="Solinas"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document describes how the Elliptic Curve Digital Signature Algorithm (ECDSA) may be used as the authentication method within the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols. ECDSA may provide benefits including computational efficiency, small signature sizes, and minimal bandwidth compared to other available digital signature methods. This document adds ECDSA capability to IKE and IKEv2 without introducing any changes to existing IKE operation. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4754"/>
          <seriesInfo name="DOI" value="10.17487/RFC4754"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="RFC9329">
          <front>
            <title>TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document describes a method to transport Internet Key Exchange Protocol (IKE) and IPsec packets over a TCP connection for traversing network middleboxes that may block IKE negotiation over UDP. This method, referred to as "TCP encapsulation", involves sending both IKE packets for Security Association (SA) establishment and Encapsulating Security Payload (ESP) packets over a TCP connection. This method is intended to be used as a fallback option when IKE cannot be negotiated over UDP.</t>
              <t>TCP encapsulation for IKE and IPsec was defined in RFC 8229. This document clarifies the specification for TCP encapsulation by including additional clarifications obtained during implementation and deployment of this method. This documents obsoletes RFC 8229.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9329"/>
          <seriesInfo name="DOI" value="10.17487/RFC9329"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC9881">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="J. Massimo" initials="J." surname="Massimo"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="B. E. Westerbaan" initials="B. E." surname="Westerbaan"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>Digital signatures are used within X.509 certificates and Certificate Revocation Lists (CRLs), and to sign messages. This document specifies the conventions for using FIPS 204, the Module-Lattice-Based Digital Signature Algorithm (ML-DSA) in Internet X.509 certificates and CRLs. The conventions for the associated signatures, subject public keys, and private key are also described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9881"/>
          <seriesInfo name="DOI" value="10.17487/RFC9881"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="RFC9909">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Algorithm Identifiers for the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA)</title>
            <author fullname="K. Bashiri" initials="K." surname="Bashiri"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
            <author fullname="S. Kousidis" initials="S." surname="Kousidis"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>Digital signatures are used within the X.509 Public Key Infrastructure, such as X.509 certificates and Certificate Revocation Lists (CRLs), as well as to sign messages. This document specifies the conventions for using the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in the X.509 Public Key Infrastructure. The conventions for the associated signatures, subject public keys, and private keys are also specified.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9909"/>
          <seriesInfo name="DOI" value="10.17487/RFC9909"/>
        </reference>
      </references>
    </references>
    <?line 250?>

<section anchor="implementation-alternatives-for-ml-dsa">
      <name>Implementation Alternatives for ML-DSA</name>
      <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to provide the SignedOctets string to the cryptographic library to generate the full signature; this works for SLH-DSA as well.</t>
      <t>The second approach involves using the Externalμ-ML-DSA API allowed by <xref target="FIPS204"/>; specifically by the comment to line 6 of algorithm 7 of FIPS 204.
In this method, the implementation calls the External μ pre-hashing mode with the SignedOctets string and the ML-DSA public key, which externalizes the message pre-hashing originally performed inside the signing operation (see Appendix D of <xref target="RFC9881"/> for ML-DSA pre-hashing). The resulting μ value is then passed to the cryptographic library to execute the Externalμ-ML-DSA.Sign API, which uses μ and the ML-DSA private key to produce the signature. This document specifies only the use of ML-DSA's External μ mode and does not use HashML-DSA. This approach avoids requiring large message inputs to be processed within potentially constrained cryptographic modules, such as Hardware Security Modules (HSMs).</t>
      <t>Both approaches are considered "pure" mode and produce the same ML-DSA signature and are fully interoperable. The choice between them depends on implementation preferences, such as whether the External μ pre-hashing step is handled internally by the cryptographic module or performed explicitly by the IKEv2 implementation.</t>
    </section>
    <section anchor="ASN">
      <name>ASN.1 Objects</name>
      <t>This section lists AlgorithmIdentifier ASN.1 objects for algorithms mentioned in the document in binary form.<br/>
This section is not normative, and these values should only be used as
examples. If the ASN.1 object listed in this section and the ASN.1
object specified by the algorithm differ, then the algorithm
specification must be used.</t>
      <t>The generic format for the AlgorithmIdentifier ASN.1 object is defined in Section 4.1.1.2 of PKIX <xref target="RFC5280"/>.</t>
      <section anchor="ml-dsa-44">
        <name>ML-DSA-44</name>
        <t>id-ml-dsa-44 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-44(17) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-44, oid = 2.16.840.1.101.3.4.3.17
Length = 13
0000: 300b 0609 6086 4801 6503 0403 11
]]></artwork>
      </section>
      <section anchor="ml-dsa-65">
        <name>ML-DSA-65</name>
        <t>id-ml-dsa-65 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-65(18) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-65, oid = 2.16.840.1.101.3.4.3.18
Length = 13
0000: 300b 0609 6086 4801 6503 0403 12
]]></artwork>
      </section>
      <section anchor="ml-dsa-87">
        <name>ML-DSA-87</name>
        <t>id-ml-dsa-87 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-87(19) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-87, oid = 2.16.840.1.101.3.4.3.19
Length = 13
0000: 300b 0609 6086 4801 6503 0403 13
]]></artwork>
      </section>
      <section anchor="slh-dsa-128s-sha2">
        <name>SLH-DSA-128S-SHA2</name>
        <t>id-slh-dsa-sha2-128s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-128s(20) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-128s, oid = 2.16.840.1.101.3.4.3.20
Length = 13
0000: 300b 0609 6086 4801 6503 0403 14
]]></artwork>
      </section>
      <section anchor="slh-dsa-128f-sha2">
        <name>SLH-DSA-128F-SHA2</name>
        <t>id-slh-dsa-sha2-128f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-128f(21) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-128f, oid = 2.16.840.1.101.3.4.3.21
Length = 13
0000: 300b 0609 6086 4801 6503 0403 15
]]></artwork>
      </section>
      <section anchor="slh-dsa-192s-sha2">
        <name>SLH-DSA-192S-SHA2</name>
        <t>id-slh-dsa-sha2-192s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-192s(22) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-192s, oid = 2.16.840.1.101.3.4.3.22
Length = 13
0000: 300b 0609 6086 4801 6503 0403 16
]]></artwork>
      </section>
      <section anchor="slh-dsa-192f-sha2">
        <name>SLH-DSA-192F-SHA2</name>
        <t>id-slh-dsa-sha2-192f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-192f(23) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-192f, oid = 2.16.840.1.101.3.4.3.23
Length = 13
0000: 300b 0609 6086 4801 6503 0403 17
]]></artwork>
      </section>
      <section anchor="slh-dsa-256s-sha2">
        <name>SLH-DSA-256S-SHA2</name>
        <t>id-slh-dsa-sha2-256s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-256s(24) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-256s, oid = 2.16.840.1.101.3.4.3.24
Length = 13
0000: 300b 0609 6086 4801 6503 0403 18
]]></artwork>
      </section>
      <section anchor="slh-dsa-256f-sha2">
        <name>SLH-DSA-256F-SHA2</name>
        <t>id-slh-dsa-sha2-256f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-256f(25) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-256f, oid = 2.16.840.1.101.3.4.3.25
Length = 13
0000: 300b 0609 6086 4801 6503 0403 19
]]></artwork>
      </section>
      <section anchor="slh-dsa-128s-shake">
        <name>SLH-DSA-128S-SHAKE</name>
        <t>id-slh-dsa-shake-128s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-128s(26) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-128s, oid = 2.16.840.1.101.3.4.3.26
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1a
]]></artwork>
      </section>
      <section anchor="slh-dsa-128f-shake">
        <name>SLH-DSA-128F-SHAKE</name>
        <t>id-slh-dsa-shake-128f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-128f(27) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-128f, oid = 2.16.840.1.101.3.4.3.27
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1b
]]></artwork>
      </section>
      <section anchor="slh-dsa-192s-shake">
        <name>SLH-DSA-192S-SHAKE</name>
        <t>id-slh-dsa-shake-192s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-192s(28) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-192s, oid = 2.16.840.1.101.3.4.3.28
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1c
]]></artwork>
      </section>
      <section anchor="slh-dsa-192f-shake">
        <name>SLH-DSA-192F-SHAKE</name>
        <t>id-slh-dsa-shake-192f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-192f(29) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-192f, oid = 2.16.840.1.101.3.4.3.29
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1d
]]></artwork>
      </section>
      <section anchor="slh-dsa-256s-shake">
        <name>SLH-DSA-256S-SHAKE</name>
        <t>id-slh-dsa-shake-256s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-256s(30) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-256s, oid = 2.16.840.1.101.3.4.3.30
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1e
]]></artwork>
      </section>
      <section anchor="slh-dsa-256f-shake">
        <name>SLH-DSA-256F-SHAKE</name>
        <t>id-slh-dsa-shake-256f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-256f(31) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-256f, oid = 2.16.840.1.101.3.4.3.31
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1f
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
