<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-mls-pq-ciphersuites-04" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="MLS Cipher Suites with ML-KEM">ML-KEM and Hybrid Cipher Suites for Messaging Layer Security</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-mls-pq-ciphersuites-04"/>
    <author initials="R." surname="Mahy" fullname="Rohan Mahy">
      <organization/>
      <address>
        <email>rohan.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="R. L." surname="Barnes" fullname="Richard L. Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <date year="2026" month="March" day="19"/>
    <area>sec</area>
    <workgroup>MLS</workgroup>
    <keyword>ML-KEM</keyword>
    <keyword>Kyber</keyword>
    <keyword>post-quantum</keyword>
    <keyword>post quantum KEM</keyword>
    <keyword>KEM</keyword>
    <keyword>PQ/T</keyword>
    <keyword>hybrid</keyword>
    <keyword>hybrid KEM</keyword>
    <keyword>Key Exchange Mechanism</keyword>
    <abstract>
      <?line 52?>

<t>This document registers new cipher suites for Messaging Layer Security (MLS) based on "post-quantum" algorithms, which are intended to be resilient to attack by quantum computers.
These cipher suites are constructed using the new Module-Lattice Key Encapsulation Mechanism (ML-KEM), optionally in combination with traditional elliptic curve KEMs, together with appropriate authenticated encryption, hash, and signature algorithms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://mlswg.github.io/mls-pq-ciphersuites/#go.draft-ietf-mls-pq-ciphersuites.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-mls-pq-ciphersuites/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MLS Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mlswg/mls-pq-ciphersuites/"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The potential availability of a cryptographically-relevant quantum computer has caused concern that well-funded adversaries could overturn long-held assumptions about the security assurances of classical Key Exchange Mechanisms (KEMs) and classical cryptographic signatures, which are fundamental to modern security protocols, including the MLS protocol <xref target="RFC9420"/>.</t>
      <t>Of particular concern are "harvest now, decrypt later" attacks, by which an attacker could collect encrypted traffic now, before a quantum computer exists, and later use a quantum computer to break the confidentiality protections on the collected traffic.</t>
      <t>In response to these concerns, the cryptographic community has defined "post-quantum" algorithms, which are designed to be resilient to attacks by quantum computers.
Symmetric algorithms can be made post-quantum secure simply by using longer keys and hashes.
For asymmetric operations such as KEMs and signatures, entirely new algorithms are needed.</t>
      <t>In this document, we define ciphersuites that use the post-quantum secure Module-Lattice-Based KEM (ML-KEM) <xref target="MLKEM"/> together with appropriate symmetric algorithms, and either traditional or Module-Lattice-Based Digital Signature Algorithm (ML-DSA) <xref target="MLDSA"/> post-quantum signature algorithms.
The traditional signature cipher suites address the risk of "harvest now, decrypt later" attacks, while not taking on the additional cost of post-quantum signatures.
The cipher suites with post-quantum signatures use only post-quantum KEMs.</t>
      <t>Following the pattern of base MLS, we define several variations, to allow for users that prefer to only use NIST-approved cryptography, users that prefer a higher security level, and users that prefer a PQ/traditional hybrid KEM over pure ML-KEM:</t>
      <ul spacing="normal">
        <li>
          <t>ML-KEM-768 + X25519 (128-bit security, Non-NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 + P-256 (128-bit security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-1024 + P-384 (192-bit security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 (128-bit security, NIST, pure PQ KEM)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (192-bit security, NIST, pure PQ KEM)</t>
        </li>
        <li>
          <t>ML-KEM-768 (192-bit security, NIST, pure PQ)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (256-bit security, NIST, pure PQ)</t>
        </li>
      </ul>
      <t>Some parts of the community wish to support the 128-bit security level with the same Authenticated Encryption with Authenticated Data (AEAD) <xref target="RFC5116"/> algorithm and hash function as used in the traditional cipher suites registered in <xref target="RFC9420"/> (AES128 GCM <xref target="GCM"/> and HMAC <xref target="RFC2104"/> with SHA-256 <xref target="SHS"/>), while other parts of the community would like to follow recent recommendations to transition immediately to AES256 GCM <xref target="GCM"/> and HMAC <xref target="RFC2104"/> with SHA-384 <xref target="SHS"/>.</t>
      <t>For all of the cipher suites defined in this document, we use SHAKE256 (Section 3.2 of <xref target="FIPS202"/>) as the Key Derivation Function (KDF).
For the cipher suites at the 192-bit or 256-security levels, we use AES256 GCM <xref target="GCM"/> as the AEAD algorithm, and HMAC <xref target="RFC2104"/> with SHA-384 <xref target="SHS"/> as the hash function.</t>
      <t>For the PQ/T hybrid KEMs and the pure ML-KEM HPKE integration, we use the KEMs defined in <xref target="I-D.ietf-hpke-pq"/>.
The signature schemes for ML-DSA-65 and ML-DSA-87 <xref target="MLDSA"/> are defined in <xref target="I-D.ietf-tls-mldsa"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="mls-cipher-suites">
        <name>MLS Cipher Suites</name>
        <t>This document requests that IANA add the following entries to the "MLS Cipher Suites" registry, replacing "XXXX" with the RFC number assigned to this document:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Name</th>
              <th align="left">Rec</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">MLS_128_MLKEM768X25519_AES128GCM_SHA256_Ed25519</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">MLS_128_MLKEM768X25519_AES256GCM_SHA384_Ed25519</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD3</td>
              <td align="left">MLS_128_MLKEM768P256_AES128GCM_SHA256_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD4</td>
              <td align="left">MLS_128_MLKEM768P256_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD5</td>
              <td align="left">MLS_192_MLKEM1024P384_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD6</td>
              <td align="left">MLS_128_MLKEM768_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD7</td>
              <td align="left">MLS_192_MLKEM1024_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD8</td>
              <td align="left">MLS_192_MLKEM768_AES256GCM_SHA384_MLDSA65</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD9</td>
              <td align="left">MLS_256_MLKEM1024_AES256GCM_SHA384_MLDSA87</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>The mapping of cipher suites to HPKE primitives <xref target="I-D.ietf-hpke-hpke"/>, HMAC hash functions, and TLS signature schemes <xref target="RFC8446"/> is as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KEM</th>
              <th align="left">KDF</th>
              <th align="left">AEAD</th>
              <th align="left">Hash</th>
              <th align="left">Signature</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0xTBD1</td>
              <td align="left">0x647a</td>
              <td align="left">0x0011</td>
              <td align="left">0x0001</td>
              <td align="left">SHA256</td>
              <td align="left">ed25519</td>
            </tr>
            <tr>
              <td align="left">0xTBD2</td>
              <td align="left">0x647a</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ed25519</td>
            </tr>
            <tr>
              <td align="left">0xTBD3</td>
              <td align="left">0x0050</td>
              <td align="left">0x0011</td>
              <td align="left">0x0001</td>
              <td align="left">SHA256</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD4</td>
              <td align="left">0x0050</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD5</td>
              <td align="left">0x0051</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD6</td>
              <td align="left">0x0041</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD7</td>
              <td align="left">0x0042</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD8</td>
              <td align="left">0x0041</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">mldsa65</td>
            </tr>
            <tr>
              <td align="left">0xTBD9</td>
              <td align="left">0x0042</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">mldsa87</td>
            </tr>
          </tbody>
        </table>
        <t>The hash used for the MLS transcript hash is the one referenced in the cipher suite name. "SHA256" and "SHA384" refer to the SHA-256 and SHA-384 functions defined in <xref target="SHS"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The first seven ciphersuites defined in this document combine a post-quantum (or PQ/T hybrid) KEM with a traditional signature algorithm. As such, they are designed to provide confidentiality against quantum and classical attacks, but provide authenticity against classical attacks only.  Thus, these cipher suites do not provide full post-quantum security, only post-quantum confidentiality.</t>
      <t>The last two cipher suites also use post-quantum signature algorithms.</t>
      <t>For security considerations related to the KEMs used in this document, please see the documents that define those KEMs <xref target="I-D.ietf-hpke-pq"/> and <xref target="I-D.irtf-cfrg-hybrid-kems"/>.
For security considerations related to the post-quantum signature algorithms used in this document, please see <xref target="I-D.ietf-tls-mldsa"/> and <xref target="I-D.ietf-lamps-dilithium-certificates"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="SHS">
          <front>
            <title>Secure hash standard</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="MLKEM">
          <front>
            <title>Module-lattice-based key-encapsulation mechanism standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="MLDSA">
          <front>
            <title>Module-lattice-based digital signature standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.204"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="FIPS202">
          <front>
            <title>SHA-3 standard :: permutation-based hash and extendable-output functions</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.202"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="GCM">
          <front>
            <title>Recommendation for block cipher modes of operation :: GaloisCounter Mode (GCM) and GMAC</title>
            <author fullname="M J Dworkin" initials="M." surname="Dworkin">
              <organization/>
            </author>
            <date year="2007"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-38d"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="RFC9420" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9420.xml">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="RFC5116" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5116.xml">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="M. Bellare" initials="M." surname="Bellare"/>
            <author fullname="R. Canetti" initials="R." surname="Canetti"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2104"/>
          <seriesInfo name="DOI" value="10.17487/RFC2104"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>Selkie Cryptography</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="September" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mldsa-01"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-hpke">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp" initials="B." surname="Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document describes a scheme for hybrid public key encryption
   (HPKE).  This scheme provides a variant of public key encryption of
   arbitrary-sized plaintexts for a recipient public key.  It also
   includes a variant that authenticates possession of a pre-shared key.
   HPKE works for any combination of an asymmetric Key Encapsulation
   Mechanism (KEM), key derivation function (KDF), and authenticated
   encryption with additional data (AEAD) encryption function.  We
   provide instantiations of the scheme using widely used and efficient
   primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key
   agreement, HMAC-based key derivation function (HKDF), and SHA2.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-hpke-03"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a post-quantum
   (PQ) KEM with a traditional cryptographic component.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
      </references>
    </references>
    <?line 135?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work would not be possible without the hard work of the CFRG Hybrid KEM design team: Aron Wussler, Bas Westerbaan, Deirdre Connolly, Mike Ounsworth, Nick Sullivan, and Stephen Farrell.
Thanks also to Joël Alwen, Marta Mularczyk, and Britta Hale.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
