<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hu-ipsecme-pqt-hybrid-auth-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IKEv2 PQTH Auth">Post-Quantum Traditional (PQ/T) Hybrid PKI Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
    <seriesInfo name="Internet-Draft" value="draft-hu-ipsecme-pqt-hybrid-auth-04"/>
    <author fullname="Jun Hu">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jun.hu@nokia.com</email>
      </address>
    </author>
    <author fullname="Yasufumi Morioka">
      <organization>NTT DOCOMO, INC.</organization>
      <address>
        <postal>
          <country>Japan</country>
        </postal>
        <email>yasufumi.morioka.dt@nttdocomo.com</email>
      </address>
    </author>
    <author fullname="Guilin Wang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>Singapore</country>
        </postal>
        <email>Wang.Guilin@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="27"/>
    <area>sec</area>
    <workgroup>ipsecme</workgroup>
    <keyword>Post-Quantum</keyword>
    <keyword>Hybrid Authentication</keyword>
    <keyword>IKEv2</keyword>
    <abstract>
      <?line 102?>

<t>One IPsec area that would be impacted by Cryptographically Relevant Quantum Computer (CRQC) is IKEv2 authentication based on traditional asymmetric cryptographic algorithms: e.g RSA, ECDSA, which are widely deployed authentication options of IKEv2. There are new Post-Quantum Cryptographic (PQC) algorithms for digital signature like NIST <xref target="ML-DSA"/>, However, it takes time for new cryptographic algorithms to mature, There is security risk to use only the new algorithm before it is field proven. This document describes a hybrid PKI authentication scheme for IKEv2 that incorporates both traditional and PQC digital signature algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hu-ipsecme-pqt-hybrid-auth/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>
  </front>
  <middle>
    <?line 107?>

<section anchor="change-log">
      <name>Change log</name>
      <section anchor="changes-in-04">
        <name>changes in -04</name>
        <ul spacing="normal">
          <li>
            <t>align to draft-ietf-lamps-pq-composite-sigs-14</t>
          </li>
          <li>
            <t>add text to clarify two setup types</t>
          </li>
          <li>
            <t>add text to describe the example exchange in section 5</t>
          </li>
          <li>
            <t>clarify using of pre-hash alg</t>
          </li>
          <li>
            <t>clarify sign operation in type-2</t>
          </li>
          <li>
            <t>ietf-lamps-cert-binding-for-multi-auth is now RFC9763</t>
          </li>
          <li>
            <t>ietf-lamps-dilithium-certificates is now RFC9881</t>
          </li>
          <li>
            <t>editorial changes</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-in-03">
        <name>changes in -03</name>
        <ul spacing="normal">
          <li>
            <t>version bump to keep doc alive</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-in-02">
        <name>Changes in -02</name>
        <ul spacing="normal">
          <li>
            <t>clarify the approach in the document is general</t>
          </li>
          <li>
            <t>dropping support for PreHash ML-DSA, change example to Pure Signature ML-DSA</t>
          </li>
          <li>
            <t>adding more details in signing process to align with ietf-lamps-pq-composite-sigs-04</t>
          </li>
          <li>
            <t>add text in Security Considerations to emphasize prohibit of key reuse</t>
          </li>
          <li>
            <t>clarify the both C and S bit <bcp14>MAY</bcp14> be 1 at the same time</t>
          </li>
          <li>
            <t>clarify the receiver behavior when the announcement contains no algid</t>
          </li>
          <li>
            <t>typo fixes</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-in-01">
        <name>Changes in -01</name>
        <ul spacing="normal">
          <li>
            <t>Only use SUPPORTED_AUTH_METHODS for algorithm combination announcement, no longer use SIGNATURE_HASH_ALGORITHMS</t>
          </li>
          <li>
            <t>add flag field in the announcement</t>
          </li>
          <li>
            <t>clarify two types of PKI setup</t>
          </li>
          <li>
            <t>add some clarifications on how AUTH payload is computed</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break traditional asymmetric cryptographic algorithms: e.g RSA, ECDSA, which are widely deployed authentication options of IKEv2. New Post-Quantum Cryptographic (PQC) algorithms for digital signature were recently published like NIST <xref target="ML-DSA"/>, However, by considering potential flaws in the new algorithm's specifications and implementations, it will take time for these new PQC algorithms to be field proven. So it is risky to only use PQC algorithms before they are mature. There is more detailed discussion on motivation of a hybrid approach for authentication in <xref section="1.2" sectionFormat="of" target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
      <t>This document describes a post-quantum traditional (PQ/T) hybrid digital signature authentication scheme for IKEv2 that incorporates both traditional and PQC digital signature algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>
      <t>Each IPsec peer announces the support of hybrid authentication via SUPPORTED_AUTH_METHODS notification as defined in <xref target="RFC9593"/>, generates and verifies AUTH payload using composite signature using the procedures defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The approach specified in this document is a general framework for all PQC and traditional algorithms. The combinations of ML-DSA variants and traditional algorithms given in this document are instantiations of the general framework.</t>
      <t>There are two types of PQ/T hybrid PKI setup:</t>
      <ol spacing="normal" type="1"><li>
          <t>Type-1: A single certificate that has a composite key as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which contains two component keys: one traditional key + one PQC key.</t>
        </li>
        <li>
          <t>Type-2: Two certificates, one certificate with traditional algorithm key and one certificate with PQC algorithm key as described in <xref target="RFC9763"/>, Each certificate <bcp14>MAY</bcp14> contain RelatedCertificate extension to associate with the other certificate.</t>
        </li>
      </ol>
      <t>A given deployment could use either type to provide PQ/T hybrid PKI. This document supports both types.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Cryptographically Relevant Quantum Computer (CRQC): A quantum computer that is capable of breaking real world cryptographic systems.</t>
      <t>Post-Quantum Cryptographic (PQC) algorithms: Asymmetric Cryptographic  algorithms are thought to be secure against CRQC.</t>
      <t>Traditional Cryptographic algorithms: Existing asymmetric Cryptographic  algorithms could be broken by CRQC, like RSA, ECDSA ..etc.</t>
    </section>
    <section anchor="ikev2-key-exchange">
      <name>IKEv2 Key Exchange</name>
      <t>There is no changes introduced in this document to the IKEv2 key exchange process, although it <bcp14>MUST</bcp14> be also resilient to CRQC when using along with the PQ/T hybrid authentication, for example key exchange using the PPK as defined in <xref target="RFC8784"/>, or hybrid key exchanges that includes PQC algorithm like <xref target="ML-KEM"/> via multiple key exchange process as defined in <xref target="I-D.ietf-ipsecme-ikev2-mlkem"/>.</t>
    </section>
    <section anchor="exchanges">
      <name>Exchanges</name>
      <t>The hybrid authentication exchanges is illustrated in an example depicted in <xref target="hybrid-auth-figure"/>, using PPK as defined in <xref target="RFC8784"/> during key exchange. However, other PQC key exchanges could also be used since how key exchange is done is independent from authentication.</t>
      <figure anchor="hybrid-auth-figure">
        <name>Hybrid Authentication Exchanges with RFC8784 Key Exchange</name>
        <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SAi1, KEi, Ni,
          N(USE_PPK) -->
                  <--  HDR, SAr1, KEr, Nr, [CERTREQ,] N(USE_PPK),
                                      N(SUPPORTED_AUTH_METHODS)

HDR, SK {IDi, CERT+, [CERTREQ,]
        [IDr,] AUTH, SAi2,
        TSi, TSr, N(PPK_IDENTITY, PPK_ID),
        N(SUPPORTED_AUTH_METHODS)} -->
                            <--  HDR, SK {IDr, CERT+, [CERTREQ,]
                                      AUTH, [N(PPK_IDENTITY)]}
]]></artwork>
      </figure>
      <ol spacing="normal" type="1"><li>
          <t>Responder announces the hybrid authentication support via SUPPORTED_AUTH_METHODS notification in IKE_SA_INIT response message. The notification includes the combinations of PQC, traditional, hash algorithm and type of hybrid PKI setup that responder supports.</t>
        </li>
        <li>
          <t>Initiator chooses a combination from responder's SUPPORTED_AUTH_METHODS, uses the combination to generate the AUTH payload, along with corresponding signing certificate(s) in CERT payload(s), and includes its support of hybrid combinations in SUPPORTED_AUTH_METHODS notification of IKE_AUTH request message.</t>
        </li>
        <li>
          <t>Responder chooses a combination from initiator's SUPPORTED_AUTH_METHODS, uses the combination to generate the AUTH payload, and includes corresponding signing certificate(s) in CERT payload(s) of IKE_AUTH response message.</t>
        </li>
      </ol>
      <section anchor="announcement">
        <name>Announcement</name>
        <t>Announcement of support hybrid authentication is through SUPPORTED_AUTH_METHODS notification as defined in <xref target="RFC9593"/>, which includes a list of acceptable authentication methods announcements. This document defines a hybrid authentication announcement with following format:</t>
        <figure anchor="ds-announce">
          <name>Hybrid Authentication Announcement</name>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Length (>=2) |  Auth Method  |   Cert Link 1 | Alg 1 flag    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Alg 1 Len     |                                               |
+-+-+-+-+-+-+-+-+                                               |
~                      AlgorithmIdentifier 1                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 2   | Alg 2 flag    |  Alg 2 Len    |               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +
|                                                               |
~                      AlgorithmIdentifier 2                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                      ...                                      ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 3   | Alg 3 flag    |  Alg 3 Len    |               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +
|                                                               |
~                      AlgorithmIdentifier N                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The announcement includes a list of N algorithms could be used for hybrid signature</t>
        <ul spacing="normal">
          <li>
            <t>Auth Method: A new value to be allocated by IANA</t>
          </li>
          <li>
            <t>Cert Link N: Links corresponding signature algorithm N with a particular CA, as defined in <xref section="3.2.2" sectionFormat="of" target="RFC9593"/></t>
          </li>
          <li>
            <t>Alg N Flag:
            </t>
            <ul spacing="normal">
              <li>
                <t>C: set to 1 if the algorithm could be used in type-1 setup</t>
              </li>
              <li>
                <t>S: set to 1 if the algorithm could be used in type-2 setup</t>
              </li>
              <li>
                <t>Both C and S <bcp14>MAY</bcp14> be set to 1 but <bcp14>MUST NOT</bcp14> set to zero at the same time</t>
              </li>
              <li>
                <t>RESERVED: set to 0</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="announce-flag">
          <name>Algorithm Flag</name>
          <artwork><![CDATA[
     0 1 2 3 4 5 6 7
    +-+-+-+-+-+-+-+-+
    |C|S| RESERVED  |
    +-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>AlgorithmIdentifier N: The variable-length ASN.1 object that is encoded using Distinguished Encoding Rules (DER) <xref target="X.690"/> and identifies the  algorithm of a composite signature as defined in <xref section="7" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
          </li>
        </ul>
        <section anchor="sending-announcement">
          <name>Sending Announcement</name>
          <t>As defined in <xref target="RFC9593"/>, the responder includes SUPPORTED_AUTH_METHODS in IKE_SA_INIT response (and potentially also in IKE_INTERMEDIATE response), while the initiator includes the notification in IKE_AUTH request.</t>
          <t>The sender includes a hybrid authentication announcement in SUPPORTED_AUTH_METHODS, which contains 0 or N composite signature AlgorithmIdentifiers sender accepts. Each AlgorithmIdentifier identifies a combination of algorithms as specified in <xref section="6" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>:</t>
          <ul spacing="normal">
            <li>
              <t>a traditional PKI algorithm (e.g. id-RSASA-PSS)</t>
            </li>
            <li>
              <t>a PQC algorithm (e.g. id-ML-DSA-44)</t>
            </li>
            <li>
              <t>a pre-hash algorithm (e.g. id-sha256)</t>
            </li>
          </ul>
          <t>In case of type-2 setup, even though the certificate is not a composite key certificate, system still uses a composite signature algorithm that corresponds to the combination of two certificates PKI algorithms and hash algorithm(s).</t>
          <t>C and S bits in flag field are set according to whether sender accepts the algorithm combination in type-1/type-2 setup.</t>
          <t>Announcement without any AlgorithmIdentifiers signals that there is no particular restrictions on algorithm.</t>
        </section>
        <section anchor="receiving-announcement">
          <name>Receiving Announcement</name>
          <t>If hybrid authentication announcement is received, and the receiver chooses to authenticate itself using hybrid authentication, then based on its local policy and certificates, one AlgorithmIdentifier (which identifies a combination of algorithms) in the hybrid authentication announcement and a PKI setup (type-1 or type-2) is chosen to create its AUTH and CERT payload(s).</t>
          <t>If there is no AlgorithmIdentifier in the announcement, the receiver <bcp14>MAY</bcp14> choose AlgorithmIdentifier just according to its local policy and certificates.</t>
        </section>
      </section>
      <section anchor="auth-cert-payload">
        <name>AUTH &amp; CERT payload</name>
        <t>The IKEv2 AUTH payload has following format as defined in <xref section="3.8" sectionFormat="of" target="RFC7296"/>:</t>
        <figure anchor="rfc7296-auth">
          <name>AUTH payload</name>
          <artwork><![CDATA[
                        1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Next Payload  |C|  RESERVED   |         Payload Length        |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Auth Method   |                RESERVED                       |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                      Authentication Data                      ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>For hybrid authentication, the AUTH Method has value defined in <xref target="announcement"/></t>
        <t>The Authentication Data field follows format defined in <xref section="3" sectionFormat="of" target="RFC7427"/>:</t>
        <figure anchor="ha-auth-data">
          <name>Authentication Data in hybrid AUTH payload</name>
          <artwork><![CDATA[
                       1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | ASN.1 Length  | AlgorithmIdentifier ASN.1 object              |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~        AlgorithmIdentifier ASN.1 object continuing            ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                         Signature Value                       ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>Based on selected AlgorithmIdentifier and setup type, the Signature Value is created via procedure defined in <xref target="type-1"/>, <xref target="type-2"/>.</t>
        <section anchor="type-1">
          <name>Type-1</name>
          <t>Assume selected AlgorithmIdentifier is A.</t>
          <ol spacing="normal" type="1"><li>
              <t>There is no change on data to be signed, e.g. InitiatorSignedOctets/ResponderSignedOctets as defined in <xref section="2.15" sectionFormat="of" target="RFC7296"/></t>
            </li>
            <li>
              <t>Follow Sign operation identified by A, e.g. <xref section="3.2" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>. The ctx input is the string of "IKEv2-PQT-Hybrid-Auth". This step outputs the composite signature, a CompositeSignatureValue.</t>
            </li>
            <li>
              <t>CompositeSignatureValue is serialized per <xref section="4.3" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>, and the output is used as Signature Value in the Authentication Data field.</t>
            </li>
          </ol>
          <t>Note: <xref target="I-D.ietf-lamps-pq-composite-sigs"/> uses a pre-hash algorithm with <xref target="ML-DSA"/> pure mode (Algorithm 2), not the HashML-DSA as defined in <xref target="ML-DSA"/>, see <xref section="2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> for the rationale.</t>
          <t>Following is an initiator example:</t>
          <ol spacing="normal" type="1"><li>
              <t>A is id-MLDSA44-RSA2048-PSS-SHA256, which uses PQC ML-DSA-44 and traditional RSASSA-PSS with pre-hash function SHA256</t>
            </li>
            <li>
              <t>Follow <xref section="3.2" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> with following inputs:  </t>
              <ul spacing="normal">
                <li>
                  <t>sk is the private key of the signing composite key certificate</t>
                </li>
                <li>
                  <t>M is InitiatorSignedOctets</t>
                </li>
                <li>
                  <t>ctx is "IKEv2-PQT-Hybrid-Auth"</t>
                </li>
              </ul>
            </li>
          </ol>
          <t>The signing composite certificate <bcp14>MUST</bcp14> be the first CERT payload.</t>
        </section>
        <section anchor="type-2">
          <name>Type-2</name>
          <ol spacing="normal" type="1"><li>
              <t>Combine PQC key and traditional key into composite key using SerializePrivateKey operation as defined in <xref section="4.2" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
            </li>
            <li>
              <t>Follow Sign operation as <xref target="type-1"/></t>
            </li>
          </ol>
          <t>Note: <xref section="6" sectionFormat="of" target="RFC9881"/> defines 3 options for ML-DSA private key storage, this document requires options that include seed since Sign operation of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> only supports seed.</t>
          <t>With example in <xref target="type-1"/>:</t>
          <ul spacing="normal">
            <li>
              <t>sk is the combined private key, e.g. output of SerializePrivateKey</t>
            </li>
            <li>
              <t>M is InitiatorSignedOctets</t>
            </li>
            <li>
              <t>ctx is "IKEv2-PQT-Hybrid-Auth"</t>
            </li>
          </ul>
          <t>The signing PQC certificate <bcp14>MUST</bcp14> be the first CERT payload in the IKEv2 message, while traditional certificate <bcp14>MUST</bcp14> be the second CERT payload.</t>
          <section anchor="relatedcertificate">
            <name>RelatedCertificate</name>
            <t>In type-2 setup, the signing certificate <bcp14>MAY</bcp14> contain RelatedCertificate extension, then the receiver <bcp14>SHOULD</bcp14> verify the extension according to <xref section="4.2" sectionFormat="of" target="RFC9763"/>. Failed verification <bcp14>SHOULD</bcp14> fail authentication.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of general PQ/T hybrid authentication is discussed in <xref target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
      <t>This document uses mechanisms defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, <xref target="RFC7427"/> and <xref target="RFC9593"/>, so the security discussion in the corresponding RFCs also apply.</t>
      <t>One important security consideration mentioned in <xref target="I-D.ietf-lamps-pq-composite-sigs"/> worth repeating here is that component key used in either <xref target="type-1"/> or <xref target="type-2"/> <bcp14>MUST NOT</bcp14> be reused in any other cases including single-algorithm case.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests a value in "IKEv2 Authentication Method" subregistry under IANA "Internet Key Exchange Version 2 (IKEv2) Parameters" registry</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST ML-DSA in hybrid with
   traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet regulatory
   guidelines.  Composite ML-DSA is applicable in applications that uses
   X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where EUF-CMA-level security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-15"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-hybrid-signature-spectrums">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="20" month="June" year="2025"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatibility, hybrid
   generality, and simultaneous verification.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-07"/>
        </reference>
        <reference anchor="RFC9763">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="A. Becker" initials="A." surname="Becker"/>
            <author fullname="R. Guthrie" initials="R." surname="Guthrie"/>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document defines a new Certificate Signing Request (CSR) attribute, relatedCertRequest, and a new X.509 certificate extension, RelatedCertificate. The use of the relatedCertRequest attribute in a CSR and the inclusion of the RelatedCertificate extension in the resulting certificate together provide additional assurance that two certificates each belong to the same end entity. This mechanism is particularly useful in the context of non-composite hybrid authentication, which enables users to employ the same certificates in hybrid authentication as in authentication done with only traditional or post-quantum algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9763"/>
          <seriesInfo name="DOI" value="10.17487/RFC9763"/>
        </reference>
        <reference anchor="RFC9881">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="J. Massimo" initials="J." surname="Massimo"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="B. E. Westerbaan" initials="B. E." surname="Westerbaan"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>Digital signatures are used within X.509 certificates and Certificate Revocation Lists (CRLs), and to sign messages. This document specifies the conventions for using FIPS 204, the Module-Lattice-Based Digital Signature Algorithm (ML-DSA) in Internet X.509 certificates and CRLs. The conventions for the associated signatures, subject public keys, and private key are also described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9881"/>
          <seriesInfo name="DOI" value="10.17487/RFC9881"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2021 (E)"/>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/final">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS-204"/>
        </reference>
        <reference anchor="ML-KEM" target="https://csrc.nist.gov/pubs/fips/203/final">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS-203"/>
        </reference>
        <reference anchor="RFC8784">
          <front>
            <title>Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security</title>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a quantum computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however, that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a quantum computer by using preshared keys.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8784"/>
          <seriesInfo name="DOI" value="10.17487/RFC8784"/>
        </reference>
        <reference anchor="RFC9370">
          <front>
            <title>Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="CJ. Tjhai" initials="CJ." surname="Tjhai"/>
            <author fullname="M. Tomlinson" initials="M." surname="Tomlinson"/>
            <author fullname="G. Bartlett" initials="G." surname="Bartlett"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
            <author fullname="O. Garcia-Morchon" initials="O." surname="Garcia-Morchon"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow multiple key exchanges to take place while computing a shared secret during a Security Association (SA) setup.</t>
              <t>This document utilizes the IKE_INTERMEDIATE exchange, where multiple key exchanges are performed when an IKE SA is being established. It also introduces a new IKEv2 exchange, IKE_FOLLOWUP_KE, which is used for the same purpose when the IKE SA is being rekeyed or is creating additional Child SAs.</t>
              <t>This document updates RFC 7296 by renaming a Transform Type 4 from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)" and renaming a field in the Key Exchange Payload from "Diffie-Hellman Group Num" to "Key Exchange Method". It also renames an IANA registry for this Transform Type from "Transform Type 4 - Diffie- Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange Method Transform IDs". These changes generalize key exchange algorithms that can be used in IKEv2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9370"/>
          <seriesInfo name="DOI" value="10.17487/RFC9370"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-mlkem">
          <front>
            <title>Post-quantum Key Exchange with ML-KEM in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="26" month="February" year="2026"/>
            <abstract>
              <t>   NIST standardized ML-KEM, a new key encapsulation mechanism, which
   can be used for quantum-resistant key establishment.  This draft
   specifies how to use ML-KEM by itself or as an additional key
   exchange in IKEv2 along with a traditional key exchange.  These
   options allow for negotiating IKE and Child SA keys which are safe
   against cryptographically relevant quantum computers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-mlkem-04"/>
        </reference>
      </references>
    </references>
    <?line 398?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
