<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-06"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 85?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document specifies a generic mechanism for integrating post-quantum cryptographic (PQC) digital signature algorithms into the IKEv2 protocol. The approach allows for seamless inclusion of any PQC signature scheme within the existing authentication framework of IKEv2. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol, as they have been standardized by NIST.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 91?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec. In the IKE_AUTH exchange, the initiator and responder independently select and use their preferred authentication method, which may differ between peers. The most common authentication method is digital signatures using asymmetric cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC4754"/>,
and Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8420"/>.</t>
      <t>The existence of a Cryptographically Relevant Quantum Computer (CRQC) would render traditional asymmetric algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the existence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are asymmetric algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines a general approach to incorporating PQC digital signature algorithms into IKEv2 while maintaining interoperability and backward compatibility, as it does not change the IKEv2 protocol but adds negotiable PQC signature algorithms. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> can be employed as authentication methods within IKEv2, as they have been standardized the US National Institute of Standards and Technology (NIST) PQC project.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="general-framework-for-pqc-authentication-in-ikev2">
      <name>General Framework for PQC Authentication in IKEv2</name>
      <t>IKEv2 authentication commonly relies on digital signatures to verify the identity of communicating peers. The mechanism described in this document enables the use of any PQC digital signature algorithm without modifying core IKEv2 operations.</t>
      <section anchor="specifying-pqc-signature-algorithms">
        <name>Specifying PQC Signature Algorithms</name>
        <ul spacing="normal">
          <li>
            <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. Any PQC digital signature algorithm can be incorporated using the "Signature Algorithm" field in authentication payloads, as defined in <xref target="RFC7427"/>.</t>
          </li>
          <li>
            <t>DER encoded AlgorithmIdentifier ASN.1 objects will be used to uniquely identify PQC signature algorithm scheme and the parameter set associated with it.</t>
          </li>
        </ul>
      </section>
      <section anchor="sig">
        <name>Signature Generation and Verification</name>
        <t>PQC signatures may be generated in either deterministic or hedged modes. The terms deterministic and hedged  used in this document are in accordance with <xref target="FIPS204"/> and <xref target="FIPS205"/>, which define the ML-DSA and SLH-DSA algorithms. Future PQC signature algorithms may adopt different nomenclature, but will be expected to follow the same principles.</t>
        <t>In the deterministic mode, the signature is derived entirely from the message and the signer’s private key, without introducing fresh randomness at signing time. While this eliminates reliance on an external random number generator (RNG), it increases susceptibility to side-channel attacks, particularly fault injection attacks.</t>
        <t>The hedged mode provides some resistance against this risk by including precomputed randomness in the signer's private key and incorporating fresh randomness generated at signing time.
This foils some side channel attack approaches, while adding no additional strength against others.
If protection against side-channel attacks are required, an ML-DSA implementation that implements side-channel resistance should be used.</t>
        <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each session, as it includes session-specific information such as nonces. PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between deterministic and hedged signing modes does not impact interoperability because the verification process remains the same for both variants.</t>
        <t>If the PQC signature algorithm uses a 'context' input parameter, it <bcp14>MUST</bcp14> be set to an empty string.</t>
        <t>Certain digital signature algorithms support two modes: "pure" mode and "pre-hash" mode. For example, ML-DSA and
SLH-DSA support both modes. In pure mode, the content is signed directly along with some domain separation
information. In contrast, pre-hash mode involves signing a digest of the message. This document specifies the use
of pure mode for signature-based authentication in IKEv2, where the message is signed directly along with domain separation information. The data used for authentication in IKEv2, as described in Section 2.15 of <xref target="RFC7296"/>, consists of elements such as nonces, SPIs, and initial exchange messages (messages preceding IKE_AUTH), which are typically within device memory constraints. While pre-hash mode can help in scenarios with memory constraints, the IKEv2 authentication data is generally small, and combined with other practical challenges (discussed in <xref target="design"/>), this document only specifies pure mode.</t>
        <section anchor="handsig">
          <name>Handling PQC Signatures in IKEv2</name>
          <t>As specified in <xref target="RFC7427"/>, both the initiator and responder <bcp14>MUST</bcp14> send the SIGNATURE_HASH_ALGORITHMS notify payload in the IKE_SA_INIT exchange to indicate the set of hash algorithms they support for signature generation and verification. The SIGNATURE_HASH_ALGORITHMS notify payload contains a list of 2-octet hash algorithm identifiers, defined in the IANA "IKEv2 Hash Algorithms" registry.</t>
          <t>For PQC signature algorithms that inherently operate directly on the raw message without hashing, such as ML-DSA and SLH-DSA, only the 'Identity' hash function is applicable. The 'Identity' hash function (value 5) is defined in Section 2 of <xref target="RFC8420"/> and indicates that the input message is used as-is, without any hash function applied. Therefore, implementations supporting such PQC signature algorithms <bcp14>MUST</bcp14> include the 'Identity' hash (5) in the SIGNATURE_HASH_ALGORITHMS notify. Furthermore, PQC signature algorithms requiring the 'Identity' hash <bcp14>MUST NOT</bcp14> be used with a peer that has not indicated support for the Identity hash in its notify payload.</t>
          <t>For additional background on design alternatives that were considered and the rationale for adopting the <xref target="RFC8420"/> approach as the cleanest and most secure method, see <xref target="design"/>.</t>
          <t>When generating a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signer as the message to be signed (with empty context string, if applicable). The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
          <t>When verifying a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signature verifier as the message to be verified (with empty context string, if applicable).</t>
          <t>IKEv2 peers supporting the PQC authentication mechanism defined in this specification <bcp14>SHOULD</bcp14> implement IKEv2 message fragmentation as specified in <xref target="RFC7383"/>, unless IKEv2 runs over a reliable transport (e.g., <xref target="RFC9329"/>) or the underlying network is known to support sufficiently large MTUs without fragmentation issues, since PQC public keys and signatures can be significantly larger than those used in traditional algorithms. 
For example, ML-DSA-44 requires a public key of 1,312 bytes and a signature of 2,420 bytes, while even the smallest SLH-DSA signature is around 7,856 bytes. As guidance, IKEv2 peers should assume a minimum PMTU of 1280 bytes for IPv6 (per <xref target="RFC8200"/>) and, where legacy IPv4 networks are a consideration, an effective MTU of 576 bytes for IPv4 (per <xref target="RFC1122"/>).</t>
        </section>
      </section>
      <section anchor="mechanisms-for-signaling-supported-key-pair-types">
        <name>Mechanisms for Signaling Supported Key Pair Types</name>
        <t>The following mechanisms can be used by peers to signal the types of digital signature algorithms and parameters they support:</t>
        <ul spacing="normal">
          <li>
            <t>Certificate Request Payload: One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload (defined in Section 3.7 of <xref target="RFC7296"/>) sent by the initiator. For example, the initiator can specify that it trusts certificates issued by a certificate authority (CA) that signs with a particular post-quantum cryptographic (PQC) signature algorithm. This implies that the initiator can process signatures generated using that algorithm, thereby allowing the responder to authenticate itself using a key pair associated with the specified PQC signature scheme.</t>
          </li>
          <li>
            <t>Authentication Method Announcement: Another method is to utilize <xref target="RFC9593"/>,   <br/>
which enables peers to declare their supported authentication methods. This improves interoperability when IKEv2 peers are configured with multiple credential types of different type to authenticate each other. The responder includes a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message, listing the  signature scheme(s) it supports under the Digital Signature authentication method. The initiator includes the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or in the IKE_INTERMEDIATE request. This notification lists the digital signature scheme(s) supported by the initiator, ordered by preference.</t>
          </li>
        </ul>
        <t>In traditional IKEv2 deployments, peers often implicitly know the signature algorithms in use based on pre-configured certificates, trusted CAs, and IKEv2 policies. However, cryptographic agility, the ability to negotiate and use different cryptographic algorithms is gaining increased attention for ensuring long-term security and interoperability. This requirement becomes even more relevant with the introduction of PQC algorithms, where multiple signature algorithms with varying security levels and performance characteristics may need to be supported over time.</t>
      </section>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky that leverages rejection sampling to render lattice- based FS schemes compact and secure. ML-DSA uses a uniform distribution over small integers for computing coefficients in error vectors, which simplifies implementation compared to schemes requiring discrete Gaussian sampling.</t>
      <t>ML-DSA is instantiated with three parameter sets for the security categories 2, 3, and 5 (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87. The DER encodings of the AlgorithmIdentifier objects for ML-DSA-44, ML-DSA-65, and ML-DSA-87 are listed in <xref target="ASN"/>.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms such as XMSS <xref target="RFC8391"/> or HSS/LMS <xref target="RFC8554"/>, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide AES-128, AES-192, and AES-256 bits of security respectively (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). This document specifies the use of the SLH-DSA algorithm in IKEv2 at each level.</t>
      <t>Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained  IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and both SHA-256 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels. Those hash function selections are internal to SLH-DSA implementations, and are not to be confused with those in the SIGNATURE_HASH_ALGORITHMS notification payload.</t>
      <t>ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme in the face of a CRQC. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
      <t>The DER encodings of the AlgorithmIdentifier objects for each SLH-DSA variant are listed in <xref target="ASN"/>.</t>
    </section>
    <section anchor="implementation-alternatives-for-ml-dsa">
      <name>Implementation Alternatives for ML-DSA</name>
      <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to simply hand the SignedOctets string to the cryptographic library to generate the full signature; this works for SLH-DSA as well.</t>
      <t>The second approach involves using the Externalμ-ML-DSA API defined in <xref target="FIPS204"/>. In this method, the implementation calls the External μ pre-hashing mode with the SignedOctets string and the ML-DSA public key, which externalizes the message pre-hashing originally performed inside the signing operation (see Appendix D of <xref target="I-D.ietf-lamps-dilithium-certificates"/>). This hash is then passed to the cryptographic library to execute the Externalμ-ML-DSA.Sign API, which uses the hash and the ML-DSA private key to produce the signature. This document specifies only the use of ML-DSA's External μ mode, and not HashML-DSA.</t>
      <t>Both approaches are considered "pure" mode and produce the same ML-DSA signature and are fully interoperable. The choice between them depends on implementation preferences, such as whether the External μ pre-hashing step is handled internally by the cryptographic module or performed explicitly by the IKEv2 implementation.</t>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and hedged signing modes. By default, ML-DSA uses a hedged approach, where the random value rnd is a 256-bit string generated by an Random Bit Generator (RBG). The signature generation function utilizes this randomness along with the private key and the preprocessed message.
In the deterministic variant, rnd is instead set to a constant 256-bit zero string. Similarly, SLH-DSA can operate in either deterministic or hedged mode. The mode is determined by the value of opt_rand, when opt_rand is set to a fixed value (e.g., the public seed from the public key), SLH-DSA generates deterministic signatures, ensuring that signing the same message twice produces the same signature. In hedged mode, opt_rand is a fresh random value, introducing additional entropy to enhance security and mitigate potential side-channel risks.</t>
      <t>IKEv2 peers can use either the hedged or deterministic variants of ML-DSA and SLH-DSA for authentication in IKEv2, with a preference for using the hedged mode (<xref target="sig"/>).</t>
      <t>The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in NIST <xref target="CSOR"/> and referenced in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. <xref target="FIPS204"/> defines both a pure and a pre-hash variant of ML-DSA, but <xref target="I-D.ietf-lamps-dilithium-certificates"/> specifies only the pure variant.</t>
      <t>The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in NIST <xref target="CSOR"/> and referenced in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. <xref target="FIPS205"/> defines two signature modes: pure mode and pre-hash mode. <xref target="I-D.ietf-lamps-x509-slhdsa"/> specifies the use of both Pure SLH-DSA and HashSLH-DSA in Public Key Infrastructure X.509 (PKIX) certificates and Certificate Revocation Lists (CRLs).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC signature algorithms are generally modeled to achieve strong unforgeability under adaptive chosen-message attacks (SUF-CMA; see Section 10.1.1 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). For example, ML-DSA provides SUF-CMA security. However, some algorithms, such as SLH-DSA, achieve existential unforgeability under chosen-message attacks (EUF-CMA; see Section 10.1.1 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). This distinction does not impact IKEv2, as the signed data in each session is unique due to the inclusion of nonces. Consequently, the oracle-based forgery attack scenarios in the EUF-CMA model do not arise in IKEv2.</t>
      <t>Different PQC signature schemes are designed to provide security levels comparable to well-established cryptographic primitives. For example, some schemes align with the NIST post-quantum security categories (Categories 1 through 5) as discussed in <xref target="FIPS204"/> and <xref target="FIPS205"/>. These categories specify target security strengths that correspond approximately to exhaustive key-search resistance for AES-128, AES-192, and AES-256, and collision-search resistance for SHA-256, SHA-384, and SHA-512. The choice of a PQC signature algorithm should be guided by the desired security level and performance requirements.</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-x509-slhdsa"/> apply to this specification as well.</t>
      <t>SLH-DSA keys are limited to 2^64 signatures. This upper bound is so large that even a IKEv2 server establishing IKEv2 sessions at an extremely high rate could not realistically reach it (at 10 billion signatures per second, it would still take over 58 years). The limit is therefore of theoretical interest only, but implementations may still track signature usage as a precautionary security measure. ML-DSA does not have a built-in signature limit, allowing for an arbitrary number of signatures to be made with the same key.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, Dan Wing, Wang Guilin, Rebecca Guthrie, Jonathan Hammell, John Mattsson and Daniel Van Geest for the discussion and comments.</t>
      <!-- Start of Appendices -->

</section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="CSOR" target="https://csrc.nist.gov/projects/computer-security-objects-register/algorithm-registration">
          <front>
            <title>Computer Security Objects Register</title>
            <author initials="" surname="NIST" fullname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2024" month="August" day="20"/>
          </front>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC4754">
          <front>
            <title>IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="D. Fu" initials="D." surname="Fu"/>
            <author fullname="J. Solinas" initials="J." surname="Solinas"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document describes how the Elliptic Curve Digital Signature Algorithm (ECDSA) may be used as the authentication method within the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols. ECDSA may provide benefits including computational efficiency, small signature sizes, and minimal bandwidth compared to other available digital signature methods. This document adds ECDSA capability to IKE and IKEv2 without introducing any changes to existing IKE operation. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4754"/>
          <seriesInfo name="DOI" value="10.17487/RFC4754"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7383">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages. This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9329">
          <front>
            <title>TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document describes a method to transport Internet Key Exchange Protocol (IKE) and IPsec packets over a TCP connection for traversing network middleboxes that may block IKE negotiation over UDP. This method, referred to as "TCP encapsulation", involves sending both IKE packets for Security Association (SA) establishment and Encapsulating Security Payload (ESP) packets over a TCP connection. This method is intended to be used as a fallback option when IKE cannot be negotiated over UDP.</t>
              <t>TCP encapsulation for IKE and IPsec was defined in RFC 8229. This document clarifies the specification for TCP encapsulation by including additional clarifications obtained during implementation and deployment of this method. This documents obsoletes RFC 8229.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9329"/>
          <seriesInfo name="DOI" value="10.17487/RFC9329"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
      </references>
    </references>
    <?line 257?>

<section anchor="design">
      <name>Discussion of ML-DSA and SLH-DSA and Prehashing</name>
      <t>This section discusses various approaches for integrating ML-DSA and SLH-DSA into IKEv2 other than those proposed above.</t>
      <t>The signature architecture within IKE was designed around RSA (and later extended to ECDSA).
In this architecture, the actual message (the SignedOctets) are first hashed (using a hash that the verifier has indicated support for), and then passed for the remaining part of the signature generation processing.
That is, it is designed for signature algorithms that first apply a hash function to the message and then perform processing on that hash. Neither ML-DSA nor SLH-DSA fits cleanly into this architecture.</t>
      <t>We see three ways to address this mismatch.</t>
      <t>The first consideration is that both ML-DSA and SLH-DSA provide prehashed parameter sets, which are designed to sign messages that have already been hashed by an external source. At first glance, this might seem like an ideal solution. However, several practical challenges arise:</t>
      <ol spacing="normal" type="1"><li>
          <t>The prehashed versions of ML-DSA and SLH-DSA appear to be rarely used, making it likely that support for them in cryptographic libraries is limited or unavailable.</t>
        </li>
        <li>
          <t>The public keys for the prehashed variants use different OIDs, which means that certificates for IKEv2 would differ from those used in other protocols. This not only complicates certificate management but also adds protocol complexity if a peer needs to support both pure and prehashed variants. Additionally, some certificate authorities (CAs) may not support issuing certificates for prehashed ML-DSA or SLH-DSA due to their limited adoption.</t>
        </li>
        <li>
          <t>Some users have explicitly indicated a preference not to use the prehashed parameter sets.</t>
        </li>
      </ol>
      <t>The second is to note that, while IKEv2 normally follows the 'hash and then sign' paradigm, it doesn't always.
EdDSA has a similar constraint on not working cleanly with the standard 'hash and then sign' paradigm, and so the existing <xref target="RFC8420"/> provides an alternative method, which ML-DSA would cleanly fit into.
We could certainly adopt this same strategy; our concern would be that it might be more difficult for IKEv2 implementors which do not already have support for EdDSA.</t>
      <t>The third way is what we can refer to as 'fake prehashing'; IKEv2 would generate the hash as specified by the pre-hash modes in <xref target="FIPS204"/> and <xref target="FIPS205"/>, but instead of running ML-DSA or SLH-DSA in prehash mode, the hash is signed as if it were the unhashed message, as is done in pure mode.
This is a violation of the spirit, if not the letter of FIPS 204, 205. 
However, it is secure (assuming the hash function is strong), and fits in cleanly with both the existing IKEv2 architecture, and what crypto libraries provide. 
Additionally, for SLH-DSA, this means that we're now dependent on collision resistance (while the rest of the SLH-DSA architecture was carefully designed not to be).</t>
      <t>After analysis, the IPsecME working group selected the approach defined in <xref target="RFC8420"/>, the second method discussed above as the most cryptographically secure way to integrate PQC algorithms into IKEv2. The details are specified in <xref target="handsig"/>.</t>
    </section>
    <section anchor="ASN">
      <name>ASN.1 Objects</name>
      <t>This section lists ASN.1 objects for algorithms mentioned in the document in binary form.<br/>
This section is not normative, and these values should only be used as
examples. If the ASN.1 object listed in this section and the ASN.1
object specified by the algorithm differ, then the algorithm
specification must be used.</t>
      <section anchor="ml-dsa-44">
        <name>ML-DSA-44</name>
        <t>id-ml-dsa-44 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-44(17) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-44, oid = 2.16.840.1.101.3.4.3.17
Length = 13
0000: 300b 0609 6086 4801 6503 0403 11
]]></artwork>
      </section>
      <section anchor="ml-dsa-65">
        <name>ML-DSA-65</name>
        <t>id-ml-dsa-65 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-65(18) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-65, oid = 2.16.840.1.101.3.4.3.18
Length = 13
0000: 300b 0609 6086 4801 6503 0403 12
]]></artwork>
      </section>
      <section anchor="ml-dsa-87">
        <name>ML-DSA-87</name>
        <t>id-ml-dsa-87 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-87(19) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-87, oid = 2.16.840.1.101.3.4.3.19
Length = 13
0000: 300b 0609 6086 4801 6503 0403 13
]]></artwork>
      </section>
      <section anchor="slh-dsa-128s-sha2">
        <name>SLH-DSA-128S-SHA2</name>
        <t>id-slh-dsa-sha2-128s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-128s(20) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-128s, oid = 2.16.840.1.101.3.4.3.20
Length = 13
0000: 300b 0609 6086 4801 6503 0403 14
]]></artwork>
      </section>
      <section anchor="slh-dsa-128f-sha2">
        <name>SLH-DSA-128F-SHA2</name>
        <t>id-slh-dsa-sha2-128f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-128f(21) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-128f, oid = 2.16.840.1.101.3.4.3.21
Length = 13
0000: 300b 0609 6086 4801 6503 0403 15
]]></artwork>
      </section>
      <section anchor="slh-dsa-192s-sha2">
        <name>SLH-DSA-192S-SHA2</name>
        <t>id-slh-dsa-sha2-192s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-192s(22) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-192s, oid = 2.16.840.1.101.3.4.3.22
Length = 13
0000: 300b 0609 6086 4801 6503 0403 16
]]></artwork>
      </section>
      <section anchor="slh-dsa-192f-sha2">
        <name>SLH-DSA-192F-SHA2</name>
        <t>id-slh-dsa-sha2-192f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-192f(23) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-192f, oid = 2.16.840.1.101.3.4.3.23
Length = 13
0000: 300b 0609 6086 4801 6503 0403 17
]]></artwork>
      </section>
      <section anchor="slh-dsa-256s-sha2">
        <name>SLH-DSA-256S-SHA2</name>
        <t>id-slh-dsa-sha2-256s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-256s(24) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-256s, oid = 2.16.840.1.101.3.4.3.24
Length = 13
0000: 300b 0609 6086 4801 6503 0403 18
]]></artwork>
      </section>
      <section anchor="slh-dsa-256f-sha2">
        <name>SLH-DSA-256F-SHA2</name>
        <t>id-slh-dsa-sha2-256f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-256f(25) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-256f, oid = 2.16.840.1.101.3.4.3.25
Length = 13
0000: 300b 0609 6086 4801 6503 0403 19
]]></artwork>
      </section>
      <section anchor="slh-dsa-128s-shake">
        <name>SLH-DSA-128S-SHAKE</name>
        <t>id-slh-dsa-shake-128s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-128s(26) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-128s, oid = 2.16.840.1.101.3.4.3.26
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1a
]]></artwork>
      </section>
      <section anchor="slh-dsa-128f-shake">
        <name>SLH-DSA-128F-SHAKE</name>
        <t>id-slh-dsa-shake-128f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-128f(27) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-128f, oid = 2.16.840.1.101.3.4.3.27
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1b
]]></artwork>
      </section>
      <section anchor="slh-dsa-192s-shake">
        <name>SLH-DSA-192S-SHAKE</name>
        <t>id-slh-dsa-shake-192s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-192s(28) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-192s, oid = 2.16.840.1.101.3.4.3.28
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1c
]]></artwork>
      </section>
      <section anchor="slh-dsa-192f-shake">
        <name>SLH-DSA-192F-SHAKE</name>
        <t>id-slh-dsa-shake-192f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-192f(29) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-192f, oid = 2.16.840.1.101.3.4.3.29
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1d
]]></artwork>
      </section>
      <section anchor="slh-dsa-256s-shake">
        <name>SLH-DSA-256S-SHAKE</name>
        <t>id-slh-dsa-shake-256s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-256s(30) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-256s, oid = 2.16.840.1.101.3.4.3.30
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1e
]]></artwork>
      </section>
      <section anchor="slh-dsa-256f-shake">
        <name>SLH-DSA-256F-SHAKE</name>
        <t>id-slh-dsa-shake-256f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-256f(31) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-256f, oid = 2.16.840.1.101.3.4.3.31
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1f
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
