<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiggers-tls-authkem-psk-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AuthKEM-PSK">KEM-based pre-shared-key handshakes for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-wiggers-tls-authkem-psk-05"/>
    <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
      <organization>PQShield</organization>
      <address>
        <postal>
          <city>Nijmegen</city>
          <country>The Netherlands</country>
        </postal>
        <email>thom@thomwiggers.nl</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave Software</organization>
      <address>
        <postal>
          <city>Lisbon</city>
          <country>Portugal</country>
        </postal>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="P." surname="Schwabe" fullname="Peter Schwabe">
      <organization>Radboud University and MPI-SP</organization>
      <address>
        <email>peter@cryptojedi.org</email>
      </address>
    </author>
    <author initials="D." surname="Stebila" fullname="Douglas Stebila">
      <organization>University of Waterloo</organization>
      <address>
        <postal>
          <city>Waterloo, ON</city>
          <country>Canada</country>
        </postal>
        <email>dstebila@uwaterloo.ca</email>
      </address>
    </author>
    <author initials="N." surname="Sullivan" fullname="Nick Sullivan">
      <organization/>
      <address>
        <email>nicholas.sullivan+ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="04"/>
    <area>SECAREA</area>
    <workgroup>TLS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 166?>

<t>This document gives a construction in which (long-term) KEM public keys are
used in the place of TLS PSK keys, avoiding concerns that may affect
systems that use symmetric-key-based PSK, such as requiring key diversification
and protection of symmetric-keys' confidentiality.</t>
      <t>This mechanism is inspired by AuthKEM (and could use AuthKEM certificate public
keys for resumption), but can be independently implemented.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wiggers-tls-authkem-psk/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        tlswg Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem"/>.</t>
    </note>
  </front>
  <middle>
    <?line 176?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><strong>Note:</strong> This is a work-in-progress draft. We welcome discussion, feedback and
contributions through the IETF TLS working group mailing list or directly on
GitHub.</t>
      <t>This document gives a construction for KEM-based, PSK-style abbreviated TLS 1.3
<xref target="RFC8446"/> handshakes. It is similar in spirit to
<xref target="I-D.celi-wiggers-tls-authkem"/>, but can be independently implemented.</t>
      <t>The abbreviated handshake is appropriate for endpoints that have KEM public
keys, and where the client has the server's public key before initiation of the
connection. Though this is currently rare, certificates can be issued with
(EC)DH public keys as specified for instance in <xref target="RFC8410"/>, or using a
delegation mechanism, such as delegated credentials <xref target="I-D.ietf-tls-subcerts"/>.
The public keys need not necessarily be certificates, however. The client might
be provided with the public key as a matter of configuration.</t>
      <t>In this proposal, we build on <xref target="RFC9180"/>. This standard currently only covers
Diffie-Hellman based KEMs, but the first post-quantum algorithms have already
been put forward <xref target="I-D.westerbaan-cfrg-hpke-xyber768d00"/>. This proposal
uses ML-KEM <xref target="FIPS203"/> <xref target="I-D.cfrg-schwabe-kyber"/>, the first selected
algorithm for key exchange in the NIST post-quantum standardization project
<xref target="NISTPQC"/>.</t>
      <section anchor="revision-history">
        <name>Revision history</name>
        <t><strong>This section should be removed prior to publication of a final version of this
document.</strong></t>
        <ul spacing="normal">
          <li>
            <t>Revision draft-wiggers-tls-authkem-psk-03, -04, -05
            </t>
            <ul spacing="normal">
              <li>
                <t>Bumped version</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-wiggers-tls-authkem-psk-02
            </t>
            <ul spacing="normal">
              <li>
                <t>Fixing a few links</t>
              </li>
              <li>
                <t>Update to ML-KEM/FIPS203</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-wiggers-tls-authkem-psk-01
            </t>
            <ul spacing="normal">
              <li>
                <t>Revised abstract</t>
              </li>
              <li>
                <t>Minor edits</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-wiggers-tls-authkem-psk-00
            </t>
            <ul spacing="normal">
              <li>
                <t>Split PSK mechanism off from <xref target="I-D.celi-wiggers-tls-authkem"/></t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-celi-wiggers-tls-authkem-01
            </t>
            <ul spacing="normal">
              <li>
                <t>Significant Editing</t>
              </li>
              <li>
                <t>Use HPKE context</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Revision draft-celi-wiggers-tls-authkem-00
            </t>
            <ul spacing="normal">
              <li>
                <t>Initial version</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="related-work">
        <name>Related work</name>
        <t>This proposal draws inspiration from <xref target="I-D.ietf-tls-semistatic-dh"/>, which is
in turn based on the OPTLS proposal for TLS 1.3 <xref target="KW16"/>. However, these proposals
require a non-interactive key exchange: they combine the client's public key
with the server's long-term key. This imposes an extra requirement: the
ephemeral and static keys MUST use the same algorithm, which this proposal does
not require. Additionally, there are no post-quantum proposals for a
non-interactive key exchange currently considered for standardization, while
several KEMs are on the way.</t>
      </section>
      <section anchor="organization">
        <name>Organization</name>
        <t>After covering preliminaries, we introduce the abbreviated AuthKEM-PSK
handshake, and its opportunistic client authentication mechanism. In the
remainder of the draft, we will discuss the necessary implementation mechanics,
such as code points, extensions, new protocol messages and the new key schedule.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The following terms are used as they are in <xref target="RFC8446"/></t>
        <dl>
          <dt>client:</dt>
          <dd>
            <t>The endpoint initiating the TLS connection.</t>
          </dd>
          <dt>connection:</dt>
          <dd>
            <t>A transport-layer connection between two endpoints.</t>
          </dd>
          <dt>endpoint:</dt>
          <dd>
            <t>Either the client or server of the connection.</t>
          </dd>
          <dt>handshake:</dt>
          <dd>
            <t>An initial negotiation between client and server that establishes the
parameters of their subsequent interactions within TLS.</t>
          </dd>
          <dt>peer:</dt>
          <dd>
            <t>An endpoint.  When discussing a particular endpoint, "peer" refers to the
endpoint that is not the primary subject of discussion.</t>
          </dd>
          <dt>receiver:</dt>
          <dd>
            <t>An endpoint that is receiving records.</t>
          </dd>
          <dt>sender:</dt>
          <dd>
            <t>An endpoint that is transmitting records.</t>
          </dd>
          <dt>server:</dt>
          <dd>
            <t>The endpoint that responded to the initiation of the TLS connection. i.e. the
peer of the client.</t>
          </dd>
        </dl>
      </section>
      <section anchor="key-encapsulation-mechanisms">
        <name>Key Encapsulation Mechanisms</name>
        <t>As this proposal relies heavily on KEMs, which are not originally used by TLS,
we will provide a brief overview of this primitive. Other cryptographic
operations will be discussed later.</t>
        <t>This definition matches the one from <xref target="I-D.celi-wiggers-tls-authkem"/>.</t>
        <t>A Key Encapsulation Mechanism (KEM) is a cryptographic primitive that defines
the methods <tt>Encapsulate</tt> and <tt>Decapsulate</tt>. In this draft, we extend these
operations with context separation strings:</t>
        <dl newline="true">
          <dt><tt>Encapsulate(pkR, context_string)</tt>:</dt>
          <dd>
            <t>Takes a public key, and produces a shared secret and encapsulation.</t>
          </dd>
          <dt><tt>Decapsulate(enc, skR, context_string)</tt>:</dt>
          <dd>
            <t>Takes the encapsulation and the private key. Returns the shared secret.</t>
          </dd>
        </dl>
        <t>We implement these methods through the KEMs defined in <xref target="RFC9180"/> to export
shared secrets appropriate for using with key schedule in TLS 1.3:</t>
        <artwork><![CDATA[
def Encapsulate(pk, context_string):
  enc, ctx = HPKE.SetupBaseS(pk, "tls13 auth-kem")
  ss = ctx.Export(context_string, HKDF.Length)
  return (enc, ss)

def Decapsulate(enc, sk, context_string):
  return HPKE.SetupBaseR(enc, sk, "tls13 auth-kem")
             .Export(context_string, HKDF.Length)
]]></artwork>
        <t>Keys are generated and encoded for transmission following the conventions in
<xref target="RFC9180"/>. The values of <tt>context_string</tt> are defined in
<xref target="kem-computations"/>.</t>
        <t><strong>Open question:</strong> Should we keep using HPKE, or just use "plain" KEMs, as in
the original KEMTLS works? Please see the discussion at <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem/issues/32">Issue
#32</eref>.</t>
      </section>
    </section>
    <section anchor="psk-protocol">
      <name>Abbreviated AuthKEM with pre-shared public KEM keys</name>
      <t>When the client already has the server's long-term public key, we can do a more
efficient handshake. The client will send the encapsulation to the server's
long-term public key in a <tt>ClientHello</tt> extension. An overview of the
abbreviated AuthKEM handshake is given in Figure 3.</t>
      <t>A client that already knows the server, might also already know that it will be
required to present a client certificate. This is expected to be especially
useful in server-to-server scenarios. The abbreviated handshake allows to
encrypt the certificate and send it similarly to early data.</t>
      <artwork><![CDATA[
       Client                                        Server
Key  ^ ClientHello
Exch | + key_share
&    | + stored_auth_key
Auth | + signature_algorithms
     | + early_auth*
     | + early_data*
     | (Certificate*)
     | (Application Data*)    -------->        ServerHello  ^
     |                                         + key_share  |
     |                                   + stored_auth_key  | Key
     |                                       + early_auth*  | Exch,
     |                                       + early_data*  | Auth &
     |                               {EncryptedExtensions}  | Server
     |                                 {KEMEncapsulation*}  | Params
     |                       <--------          {Finished}  v
     |                       <-------- [Application Data*]
     | (EndOfEarlyData)
     v {Finished}            -------->

       [Application Data]    <------->  [Application Data]

        +  Indicates noteworthy extensions sent in the
           previously noted message.
        *  Indicates optional or situation-dependent
           messages/extensions that are not always sent.
        <> Indicates messages protected using keys
           derived from a
           client_early_handshake_traffic_secret.
        () Indicates messages protected using keys derived
           from a client_early_traffic_secret.
        {} Indicates messages protected using keys
           derived from a
           [sender]_handshake_traffic_secret.
        [] Indicates messages protected using keys
           derived from [sender]_application_traffic_secret_N.

      Figure 3: Abbreviated AuthKEM handshake, with optional
                opportunistic client authentication.
]]></artwork>
      <section anchor="sec-authkem-pdk-negotiation">
        <name>Negotiation</name>
        <t><strong>In an <xref target="psk-variant"/>, we sketch a variant based on the PSK extension.</strong></t>
        <t>A client that knows a server's long-term KEM public key MAY choose to attempt
the abbreviated AuthKEM handshake. If it does so, it MUST include the
<tt>stored_auth_key</tt> extension in the <tt>ClientHello</tt> message. This message MUST
contain the encapsulation against the long-term KEM public key. Details of the
extension are described below. The shared secret resulting from the
encapsulation is mixed in to the <tt>EarlySecret</tt> computation.</t>
        <t>The client MAY additionally choose to send a certificate to the server. It MUST
know what ciphersuites the server accepts before it does so. If it chooses to do
so, it MUST send the <tt>early_auth</tt> extension to the server. The <tt>Certificate</tt>
is encrypted with the <tt>client_early_handshake_traffic_secret</tt>.</t>
        <t>The server MAY accept the abbreviated AuthKEM handshake. If it does, it MUST
reply with a <tt>stored_auth_key</tt> extension. If it does not accept the
abbreviated AuthKEM handshake, for instance because it does not have access to
the correct secret key anymore, it MUST NOT reply with a <tt>stored_auth_key</tt>
extension. The server, if it accepts the abbreviated AuthKEM handshake, MAY
additionally accept the <tt>Certificate</tt> message. If it does, it MUST reply with
a <tt>early_auth</tt> extension.</t>
        <t>If the client, who sent a <tt>stored_auth_key</tt> extension, receives a
<tt>ServerHello</tt> without <tt>stored_auth_key</tt> extension, it MUST recompute
<tt>EarlySecret</tt> without the encapsulated shared secret.</t>
        <t>If the client sent a <tt>Certificate</tt> message, it MUST drop that message from its
transcript. The client MUST then continue with a full AuthKEM handshake.</t>
      </section>
      <section anchor="rtt-forward-secrecy-and-replay-protection">
        <name>0-RTT, forward secrecy and replay protection</name>
        <t>The client MAY send 0-RTT data, as in <xref target="RFC8446"/> 0-RTT mode. The
<tt>Certificate</tt> MUST be sent before the 0-RTT data.</t>
        <t>As the <tt>EarlySecret</tt> is derived only from a key encapsulated to a long-term
secret, it does not have forward secrecy. Clients MUST take this into
consideration before transmitting 0-RTT data or opting in to early client auth.
Certificates and 0-RTT data may also be replayed.</t>
        <t>This will be discussed in full under Security Considerations.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <t>In this section we will discuss the implementation details such as extensions
and key schedule.</t>
      <section anchor="negotiation-of-authkem-algorithms">
        <name>Negotiation of AuthKEM algorithms</name>
        <t>Clients and servers indicate support for AuthKEM authentication by negotiating
it as if it were a signature scheme (part of the <tt>signature_algorithms</tt>
extension). We thus add these new signature scheme values (even though, they are
not signature schemes) for the KEMs defined in <xref target="RFC9180"/> Section 7.1. Note
that we will be only using their internal KEM's API defined there.</t>
        <artwork><![CDATA[
enum {
  dhkem_p256_sha256   => TBD,
  dhkem_p384_sha384   => TBD,
  dhkem_p521_sha512   => TBD,
  dhkem_x25519_sha256 => TBD,
  dhkem_x448_sha512   => TBD,
  kem_x25519kyber768  => TBD, /*draft-westerbaan-cfrg-hpke-xyber768d00*/
}
]]></artwork>
        <t>This matches the definition in <xref target="I-D.celi-wiggers-tls-authkem"/>.</t>
        <t><strong>Please give feedback on which KEMs should be included</strong></t>
        <t>When present in the <tt>signature_algorithms</tt> extension, these values indicate
AuthKEM support with the specified key exchange mode. These values MUST NOT
appear in <tt>signature_algorithms_cert</tt>, as this extension specifies the signing
algorithms by which certificates are signed.</t>
      </section>
      <section anchor="clienthello-and-serverhello-extensions">
        <name>ClientHello and ServerHello extensions</name>
        <t>A number of AuthKEM messages contain tag-length-value encoded extensions
structures. We are adding those extensions to the <tt>ExtensionType</tt> list from TLS
1.3.</t>
        <artwork><![CDATA[
enum {
  ...
  stored_auth_key (TBD),                 /* RFC TBD */
  early_auth (TBD),                      /* RFC TBD */
  (65535)
} ExtensionType;
]]></artwork>
        <t>The table below indicates the messages where a given extension may
appear:</t>
        <artwork><![CDATA[
+---------------------------------------+-------------+
| Extension                             |    KEM-Auth |
+---------------------------------------+-------------+
| stored_auth_key [RFCTBD]              |      CH, SH |
|                                       |             |
| early_auth  [RFCTBD]                  |      CH, SH |
|                                       |             |
+---------------------------------------+-------------+
]]></artwork>
        <section anchor="stored-auth-key">
          <name>Stored Auth Key</name>
          <t>To transmit the early authentication encapsulation in the abbreviated AuthKEM
handshake, this document defines a new extension type
(<tt>stored_auth_key (TBD)</tt>). It is used in <tt>ClientHello</tt> and <tt>ServerHello</tt>
messages.</t>
          <t>The <tt>extension_data</tt> field of this extension, when included in the
<tt>ClientHello</tt>, MUST contain the <tt>StoredInformation</tt> structure.</t>
          <artwork><![CDATA[
struct {
      select (type) {
        case client:
          opaque key_fingerprint<1..255>;
          opaque ciphertext<1..2^16-1>
        case server:
          AcceptedAuthKey '1';
      } body;
} StoredInformation
]]></artwork>
          <t>This extension MUST contain the following information when included in
<tt>ClientHello</tt> messages:</t>
          <ul spacing="normal">
            <li>
              <t>The client indicates the public key encapsulated to by its fingerprint</t>
            </li>
            <li>
              <t>The client submits the ciphertext</t>
            </li>
          </ul>
          <t>The server MUST send the extension back as an acknowledgement, if and only if it
wishes to negotiate the abbreviated AuthKEM handshake.</t>
          <t>The fingerprint calculation proceeds this way:</t>
          <ol spacing="normal" type="1"><li>
              <t>Compute the SHA-256 hash of the input data. Note that the computed hash only
covers the input data structure (and not any type and length information of
the record layer).</t>
            </li>
            <li>
              <t>Use the output of the SHA-256 hash.</t>
            </li>
          </ol>
          <t>If this extension is not present, the client and the server MUST NOT negotiate
the abbreviated AuthKEM handshake.</t>
          <t>The presence of the fingerprint might reveal information about the identity of
the server that the client has. This is discussed further under <xref target="sec-considerations">Security
Considerations</xref>.</t>
        </section>
        <section anchor="early-authentication">
          <name>Early authentication</name>
          <t>To indicate the client will attempt client authentication in the abbreviated
AuthKEM handshake, and for the server to indicate acceptance of attempting this
authentication mechanism, we define the ```early_auth (TDB)<tt>extension. It is
used in</tt>ClientHello<tt>and</tt>ServerHello`` messages.</t>
          <artwork><![CDATA[
struct {} EarlyAuth
]]></artwork>
          <t>This is an empty extension.</t>
          <t>It MUST NOT be sent if the <tt>stored_auth_key</tt> extension is not present.</t>
        </section>
      </section>
      <section anchor="protocol-messages">
        <name>Protocol messages</name>
        <t>The handshake protocol is used to negotiate the security parameters
of a connection, as in TLS 1.3. It uses the same messages, except
for the addition of a <tt>KEMEncapsulation</tt> message and does not use
the <tt>CertificateVerify</tt> one.</t>
        <t>Note that these definitions mirror <xref target="I-D.celi-wiggers-tls-authkem"/>.</t>
        <artwork><![CDATA[
enum {
    ...
    kem_encapsulation(tbd),
    ...
    (255)
  } HandshakeType;

struct {
    HandshakeType msg_type;  /* handshake type */
    uint24 length;           /* remaining bytes in message */
    select (Handshake.msg_type) {
        ...
        case kem_encapsulation:     KEMEncapsulation;
        ...
    };
} Handshake;
]]></artwork>
        <t>Protocol messages MUST be sent in the order defined in <xref target="psk-protocol"/>. A peer
which receives a handshake message in an unexpected order MUST abort the
handshake with an "unexpected_message" alert.</t>
        <t>The <tt>KEMEncapsulation</tt> message is defined as follows:</t>
        <artwork><![CDATA[
struct {
    opaque certificate_request_context<0..2^8-1>
    opaque encapsulation<0..2^16-1>;
} KEMEncapsulation;
]]></artwork>
        <t>The encapsulation field is the result of a <tt>Encapsulate()</tt> function. The
<tt>Encapsulate()</tt> function will also result in a shared secret (<tt>ssS</tt> or <tt>ssC</tt>,
depending on the peer) which is used to derive the <tt>AHS</tt> or <tt>MS</tt> secrets.</t>
        <t>If the <tt>KEMEncapsulation</tt> message is sent by a server, the authentication
algorithm MUST be one offered in the client's <tt>signature_algorithms</tt> extension
unless no valid certificate chain can be produced without unsupported
algorithms.</t>
        <t>If sent by a client, the authentication algorithm used in the signature MUST be
one of those present in the <tt>supported_signature_algorithms</tt> field of the
<tt>signature_algorithms</tt> extension in the <tt>CertificateRequest</tt> message.</t>
        <t>In addition, the authentication algorithm MUST be compatible with the key(s) in
the sender's end-entity certificate.</t>
        <t>The receiver of a <tt>KEMEncapsulation</tt> message MUST perform the <tt>Decapsulate()</tt>
operation by using the sent encapsulation and the private key of the public key
advertised in the end-entity certificate sent. The <tt>Decapsulate()</tt> function will
also result on a shared secret (<tt>ssS</tt> or <tt>ssC</tt>, depending on the Server or
Client executing it respectively) which is used to derive the <tt>AHS</tt> or <tt>MS</tt>
secrets.</t>
        <t><tt>certificate_request_context</tt> is included to allow the recipient to identify the
certificate against which the encapsulation was generated. It MUST be set to the
value in the <tt>Certificate</tt> message to which the encapsulation was computed.</t>
      </section>
      <section anchor="cryptographic-computations">
        <name>Cryptographic computations</name>
        <t>The AuthKEM handshake establishes three input secrets which are combined to
create the actual working keying material, as detailed below. The key derivation
process incorporates both the input secrets and the handshake transcript.  Note
that because the handshake transcript includes the random values from the Hello
messages, any given handshake will have different traffic secrets, even if the
same input secrets are used.</t>
        <section anchor="authkem-psk-key-schedule">
          <name>AuthKEM-PSK key schedule</name>
          <t>The AuthKEM-PSK handshake follows the <xref target="RFC8446"/> key schedule closely. We
change the computation of the <tt>EarlySecret</tt> as follows, and add a computation
for <tt>client_early_handshake_traffic_secret</tt>:</t>
          <artwork><![CDATA[
            0
            |
            v
    SSs -> HKDF-Extract = Early Secret
            |
            ...
            +--> Derive-Secret(., "c e traffic", ClientHello)
            |                  = client_early_traffic_secret
            |
            +--> Derive-Secret(., "c e hs traffic", ClientHello)
            |                  = client_early_handshake_traffic_secret
            ...
            |
            v
            Derive-Secret(., "derived", "") = dES
            ...
]]></artwork>
          <t>We change the computation of <tt>Main Secret</tt> as follows:</t>
          <artwork><![CDATA[
            Derive-Secret(., "derived", "") = dHS
            |
            v
SSc||0 * -> HKDF-Extract = Main Secret
            |
            ...
]]></artwork>
          <t><tt>SSc</tt> is included if client authentication is used; otherwise, the value <tt>0</tt> is
used.</t>
        </section>
        <section anchor="kem-computations">
          <name>Computations of KEM shared secrets</name>
          <t>As in <xref target="I-D.celi-wiggers-tls-authkem"/>, operations to compute <tt>SSs</tt> or
<tt>SSc</tt> from the client are:</t>
          <artwork><![CDATA[
SSs, encapsulation <- Encapsulate(public_key_server,
                                  "server authentication")
               SSc <- Decapsulate(encapsulation, private_key_client,
                                  "client authentication")
]]></artwork>
          <t>The operations to compute <tt>SSs</tt> or <tt>SSc</tt> from the server are:</t>
          <artwork><![CDATA[
               SSs <- Decapsulate(encapsulation, private_key_server
                                  "server authentication")
SSc, encapsulation <- Encapsulate(public_key_client,
                                  "client authentication")
]]></artwork>
        </section>
        <section anchor="explicit-authentication-messages">
          <name>Explicit Authentication Messages</name>
          <t>AuthKEM upgrades implicit to explicit authentication through the <tt>Finished</tt>
message. With AuthKEM-PSK, the server achieves explicit authentication when
sending their <tt>Finished</tt> message and the client when they send their
<tt>Finished</tt> message.</t>
          <t>The key used to compute the <tt>Finished</tt> message MUST be computed from the
<tt>MainSecret</tt> using HKDF. Specifically:</t>
          <artwork><![CDATA[
server/client_finished_key =
    HKDF-Expand-Label(MainSecret,
                      server/client_label,
                      "", Hash.length)
server_label = "tls13 server finished"
client_label = "tls13 client finished"
]]></artwork>
          <t>The <tt>verify_data</tt> value is computed as follows:</t>
          <artwork><![CDATA[
server/client_verify_data =
      HMAC(server/client_finished_key,
           Transcript-Hash(Handshake Context,
                           Certificate*,
                           KEMEncapsulation*,
                           Finished**)

*  Only included if present.
** The party who last sends the finished message in terms of flights
   includes the other party's Finished message.
]]></artwork>
          <t>These computations match <xref target="I-D.celi-wiggers-tls-authkem"/>.</t>
          <t>See <xref target="sec-authkem-pdk-negotiation"/> for special considerations for the
abbreviated AuthKEM handshake.</t>
          <t>Any records following a Finished message MUST be encrypted under the appropriate
application traffic key as described in TLS 1.3. In particular, this includes
any alerts sent by the server in response to client <tt>Certificate</tt> and
<tt>KEMEncapsulation</tt> messages.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <ul spacing="normal">
        <li>
          <t>Because the Main Secret is derived from both the ephemeral key exchange,
as well as from the key exchanges completed for server and (optionally) client
authentication, the MS secret always reflects the peers' views of the authentication
status correctly. This is an improvement over TLS 1.3 for client authentication.</t>
        </li>
        <li>
          <t>The academic works proposing AuthKEM (KEMTLS) contains an in-depth technical
discussion of and a proof of the security of the handshake protocol without
client authentication (<xref target="SSW20"/>, <xref target="Wig24"/>).</t>
        </li>
        <li>
          <t>The work proposing the variant protocol (<xref target="SSW21"/>, <xref target="Wig24"/>) with pre-distributed public
keys (the abbreviated AuthKEM handshake) has a proof for both unilaterally and
mutually authenticated handshakes.</t>
        </li>
        <li>
          <t>We have machine-verified proofs of the security of KEMTLS and KEMTLS-PDK in
Tamarin. <xref target="CHSW22"/></t>
        </li>
        <li>
          <t>When the client opportunistically sends its certificate, it is not encrypted
under a forward-secure key.  This has similar considerations and trade-offs as
0-RTT data.  If it is a replayed message, there are no expected consequences
for security as the malicious replayer will not be able to decapsulate the
shared secret.</t>
        </li>
        <li>
          <t>A client that opportunistically sends its certificate, SHOULD send it
encrypted with a ciphertext that it knows the server will accept. Otherwise,
it will fail.</t>
        </li>
        <li>
          <t>If AuthKEM-PSK client authentication is used, the resulting shared secret is
included in the key schedule. This ensures that both peers have a consistent
view of the authentication status, unlike <xref target="RFC8446"/>.</t>
        </li>
      </ul>
      <section anchor="server-anonymity">
        <name>Server Anonymity</name>
        <t>The PDK extension identifies the public key to which the client has encapsulated
via a hash. This reveals some information about which server identity the client
has. <xref target="I-D.ietf-tls-esni"/> may help alleviate this.</t>
        <t>An alternative approach could be the use of trial decryption. If the KEM used
has anonymity, the ciphertext that the client sends is not linkable to the
server public key. ML-KEM offers post-quantum anonymity <xref target="MX22"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8410">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves. The signature algorithms covered are Ed25519 and Ed448. The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SSW20">
          <front>
            <title>Post-Quantum TLS without Handshake Signatures</title>
            <author initials="D." surname="Stebila" fullname="Douglas Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author initials="P." surname="Schwabe" fullname="Peter Schwabe">
              <organization>Radboud University and Max Planck Institute for Security and Privacy</organization>
            </author>
            <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
              <organization>Radboud University</organization>
            </author>
            <date year="2020" month="November"/>
          </front>
          <seriesInfo name="ACM CCS 2020" value=""/>
          <seriesInfo name="DOI" value="10.1145/3372297.3423350"/>
          <seriesInfo name="IACR ePrint" value="https://ia.cr/2020/534"/>
        </reference>
        <reference anchor="SSW21">
          <front>
            <title>More Efficient KEMTLS with Pre-Shared Keys</title>
            <author initials="D." surname="Stebila" fullname="Douglas Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author initials="P." surname="Schwabe" fullname="Peter Schwabe">
              <organization>Radboud University and Max Planck Institute for Security and Privacy</organization>
            </author>
            <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
              <organization>Radboud University</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
          <seriesInfo name="ESORICS 2021" value=""/>
          <seriesInfo name="DOI" value="10.1007/978-3-030-88418-5_1"/>
          <seriesInfo name="IACR ePrint" value="https://ia.cr/2021/779"/>
        </reference>
        <reference anchor="CHSW22">
          <front>
            <title>A tale of two models: formal verification of KEMTLS in Tamarin</title>
            <author initials="S." surname="Celi" fullname="Sofía Celi">
              <organization>Brave Software</organization>
            </author>
            <author initials="J." surname="Hoyland" fullname="Jonathan Hoyland">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <author initials="D." surname="Stebila" fullname="Douglas Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
              <organization>Radboud University</organization>
            </author>
            <date year="2022" month="August"/>
          </front>
          <seriesInfo name="ESORICS 2022" value=""/>
          <seriesInfo name="DOI" value="10.1007/978-3-031-17143-7_4"/>
          <seriesInfo name="IACR ePrint" value="https://ia.cr/2022/1111"/>
        </reference>
        <reference anchor="NISTPQC">
          <front>
            <title>Post-Quantum Cryptography Standardization</title>
            <author initials="" surname="NIST">
              <organization>National Institute for Standards and Technology</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="Wig24">
          <front>
            <title>Post-Quantum TLS</title>
            <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
              <organization>Radboud University</organization>
            </author>
            <date year="2024" month="January" day="09"/>
          </front>
          <seriesInfo name="PhD thesis" value="https://thomwiggers.nl/publication/thesis/"/>
        </reference>
        <reference anchor="KW16" target="https://ia.cr/2015/978">
          <front>
            <title>The OPTLS Protocol and TLS 1.3</title>
            <author initials="H." surname="Krawczyk" fullname="Hugo Krawczyk">
              <organization>IBM Research</organization>
            </author>
            <author initials="H." surname="Wee" fullname="Hoeteck Wee">
              <organization>ENS, CNRS, INRIA and Columbia University</organization>
            </author>
            <date year="2016"/>
          </front>
          <seriesInfo name="Proceedings of Euro S&amp;P 2016" value=""/>
        </reference>
        <reference anchor="MX22">
          <front>
            <title>Post-Quantum Anonymity of Kyber</title>
            <author initials="V." surname="Maram" fullname="Varum Maram">
              <organization>ETH Zurich</organization>
            </author>
            <author initials="K." surname="Xagawa" fullname="Keita Xagawa">
              <organization>NTT Social Informatics Laboratories</organization>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="PKC" value="2023"/>
          <seriesInfo name="IACR ePrint" value="https://ia.cr/2022/1696"/>
        </reference>
        <reference anchor="FIPS203">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author initials="" surname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="DOI" value="10.6028/NIST.FIPS.203"/>
        </reference>
        <reference anchor="I-D.celi-wiggers-tls-authkem">
          <front>
            <title>KEM-based Authentication for TLS 1.3</title>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization>PQShield</organization>
            </author>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>Radboud University and MPI-SP</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
         </author>
            <date day="4" month="November" year="2025"/>
            <abstract>
              <t>   This document gives a construction for a Key Encapsulation Mechanism
   (KEM)-based authentication mechanism in TLS 1.3.  This proposal
   authenticates peers via a key exchange protocol, using their long-
   term (KEM) public keys.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-celi-wiggers-tls-authkem-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-subcerts">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Subodh Iyengar" initials="S." surname="Iyengar">
              <organization>Facebook</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="30" month="June" year="2022"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations.  For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA).  This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-subcerts-15"/>
        </reference>
        <reference anchor="I-D.westerbaan-cfrg-hpke-xyber768d00">
          <front>
            <title>X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE</title>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="May" year="2024"/>
            <abstract>
              <t>   This memo defines X25519Kyber768Draft00, a hybrid post-quantum KEM,
   for HPKE (RFC9180).  This KEM does not support the authenticated
   modes of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-westerbaan-cfrg-hpke-xyber768d00-03"/>
        </reference>
        <reference anchor="I-D.cfrg-schwabe-kyber">
          <front>
            <title>Kyber Post-Quantum KEM</title>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="January" year="2024"/>
            <abstract>
              <t>   This memo specifies a preliminary version ("draft00", "v3.02") of
   Kyber, an IND-CCA2 secure Key Encapsulation Method.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bwesterb.github.io/draft-schwabe-cfrg-kyber/draft-cfrg-
   schwabe-kyber.html.  Status information for this document may be
   found at https://datatracker.ietf.org/doc/draft-cfrg-schwabe-kyber/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bwesterb/draft-schwabe-cfrg-kyber.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cfrg-schwabe-kyber-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-semistatic-dh">
          <front>
            <title>Semi-Static Diffie-Hellman Key Establishment for TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Apple Inc.</organization>
            </author>
            <date day="7" month="March" year="2020"/>
            <abstract>
              <t>   TLS 1.3 [RFC8446] specifies a signed Diffie-Hellman exchange modelled
   after SIGMA [SIGMA].  This design is suitable for endpoints whose
   certified credential is a signing key, which is the common situation
   for current TLS servers.  This document describes a mode of TLS 1.3
   in which one or both endpoints have a certified DH key which is used
   to authenticate the exchange.

Note to Readers

   Source for this draft and an issue tracker can be found at
   https://github.com/ekr/draft-rescorla-tls13-semistatic-dh
   (https://github.com/ekr/draft-rescorla-tls13-semistatic-dh).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-semistatic-dh-01"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
        </reference>
      </references>
    </references>
    <?line 769?>

<section anchor="open-points-of-discussion">
      <name>Open points of discussion</name>
      <t>The following are open points for discussion. The corresponding GitHub issues
will be linked.</t>
      <section anchor="psk-variant">
        <name>Alternative implementation based on the <tt>pre_shared_key</tt> extension</name>
        <t><strong>This is discussed in <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem/issues/25">Issue
#25</eref>.</strong></t>
        <t><xref target="RFC8446"/> defines a PSK handshake that can be used with symmetric keys from
e.g. session tickets. In this section, we sketch an alternative approach to
AuthKEM-PSK based on the <tt>pre_shared_key</tt> extension.</t>
        <t>A client needs to be set up with the following information:</t>
        <artwork><![CDATA[
struct {
    uint32 authkem_psk_config_version;
    uint32 config_lifetime;
    opaque KEMPublicKey;
} AuthKEMPSKConfig;
]]></artwork>
        <t>The client computes a KEM ciphertext and shared secret as follows:</t>
        <artwork><![CDATA[
SSs, encapsulation <- Encapsulate(public_key_server,
                                  "server authentication")
]]></artwork>
        <t><tt>SSs</tt> is used in place of <tt>PSK</tt> in the TLS 1.3 key schedule, and <tt>binder_key</tt> is
derived as follows:</t>
        <artwork><![CDATA[
          0
          |
          v
SSc ->  HKDF-Extract = Early Secret
          |
          +-----> Derive-Secret(., "ext binder" | "res binder", "")
          |                     = binder_key
          ...
]]></artwork>
        <t>In the <tt>pre_shared_key</tt> extension's <tt>identities</tt>, the client sends the following
data:</t>
        <artwork><![CDATA[
struct {
  uint32 authkem_psk_config_version;
  opaque KEMCiphertext;
} AuthKEMPSKIdentity
]]></artwork>
        <t>The server computes the shared secret <tt>SSs</tt> from
<tt>AuthKEMPSKIdentity.KEMCiphertext</tt> as follows:</t>
        <artwork><![CDATA[
SSs <- Decapsulate(encapsulation,
                   private_key_server
                   "server authentication")
]]></artwork>
        <t>The PSK binder value is computed as specified in <xref target="RFC8446"/>, section 4.2.11.2.
The server MUST verify the binder before continuing and abort the handshake if
verification fails.</t>
        <t><strong>To be determined: how to handle immediate client authentication.</strong></t>
      </section>
      <section anchor="interactions-with-dtls">
        <name>Interactions with DTLS</name>
        <t>It is currently open if there need to be made modifications to better support
integration with DTLS. Discussion is at <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem/issues/23">Issue
#23</eref>.</t>
      </section>
      <section anchor="interaction-with-signing-certificates">
        <name>Interaction with signing certificates</name>
        <t>Tracked by <eref target="https://github.com/kemtls/draft-celi-wiggers-tls-authkem/issues/20">Issue
#20</eref>.</t>
        <t>In the current state of the draft, we have not yet discussed combining
traditional signature-based authentication with KEM-based authentication. One
might imagine that the Client has a signing certificate and the server has a KEM
public key.</t>
        <t>In the current draft, clients MUST use a KEM certificate algorithm if the server
negotiated AuthKEM.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This work has been supported by the European Research Council through Starting
Grant No. 805031 (EPOQUE).</t>
      <t>Part of this work was supported by the NLNet NGI Assure theme fund project
<eref target="https://nlnet.nl/project/KEMTLS/">"Standardizing KEMTLS"</eref></t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
