<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hybrid-signature-spectrums-06" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="ietf-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-06"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>durumcrustulum@gmail.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2025" month="January" day="09"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 120?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatibility, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-ietf-pquip-hybrid-signature-spectrums</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Post-Quantum Use In Protocols Working Group mailing list (pqc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-spectrums"/>.</t>
    </note>
  </front>
  <middle>
    <?line 133?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Plans to transition protocols to post-quantum cryptography sometimes focus on
confidentiality, given the potential risk of store and decrypt attacks, where
data encrypted today using traditional algorithms could be decrypted in the
future by an attacker with a sufficiently powerful quantum computer, also
known as a Cryptographically-Relevant Quantum Computer (CRQC).</t>
      <t>It is important to also consider transitions to post-quantum authentication;
delaying such transitions creates risks. For example, attackers may be able
to carry out quantum attacks against RSA-2048 years before the public is
aware of these capabilities. Furthermore, there are applications where
algorithm turn-over is complex or takes a long time. There are also
applications where future checks on past authenticity play a role, such as
long-lived digital signatures on legal documents.</t>
      <t>Still, there have been successful attacks against proposals using
post-quantum cryptography. Sometimes an attack exploits implementation
issues, such as <xref target="KYBERSLASH"/>, which exploits timing variations, or <xref target="HQC_CVE"/>
which exploits implementation bugs. Sometimes an attack works for all
implementations of the specified algorithm. Research has indicated that
implementation-independent attacks published in 2023 or earlier had broken
48% of the proposals in Round 1 of the NIST Post-Quantum Cryptography
Standardization Project, 25% of the proposals not broken in Round 1, and 36%
of the proposals selected by NIST for Round 2 <xref target="QRCSP"/>.</t>
      <t>Such cryptanalysis and security concerns are one reason for to consider
'hybrid' cryptographic algorithms, which combine both traditional and
post-quantum (or more generally a combination of two or more) algorithms. A
core objective of hybrid algorithms is to protect against quantum computers
while at the same time making clear that the change is not reducing
security. A premise of security of these algorithms being that if at least
one of the two component algorithms of the hybrid scheme holds, the
confidentiality or authenticity offered by that scheme is maintained. It
should be noted that the word 'hybrid' has many uses, but this document uses
'hybrid' only in this algorithm sense.</t>
      <t>Whether or not hybridization is desired depends on the use case and security
threat model. Users may recognize a need to start post-quantum transition,
even while issues such as those described above are a concern. For this,
hybridization can support transition. It should be noted that hybridization
is not necessary for all systems; recommendations on system types or analysis
methods for such determination are out of scope of this document. For cases
where hybridization is determined to be advantageous, a decision on how to
hybridize needs to be made. With many options available, this document is
intended to provide context on some of the trade-offs and nuances to
consider.</t>
      <t>Hybridization of digital signatures, where the hybrid signature may be
expected to attest to both standard and post-quantum components,
is subtle to design and implement due to the potential separability of the
hybrid/dual signatures and the risk of downgrade/stripping attacks.  There
are also a range of requirements and properties that may be required from
hybrid signatures, which will be discussed in this document. Some of these are
mutually exclusive, which highlights the importance of considering use-case
specific requirements.</t>
      <t>This document focuses on explaining a spectrum of different hybrid signature
scheme design categories and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature
schemes to help them decide what properties they do and do not require from
their use case. In scope limitations, it does not attempt to give concrete
recommendations for any use case. It also intentionally does not propose
concrete hybrid signature combiners or instantiations thereof. As with the
data authenticity guarantees provided by any digital signature, the security
guarantees discussed in this document are reliant on correct provisioning of
the keys involved, e.g. entity authentication.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet documents on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.
In this draft, the secret signing key <tt>sk</tt> is assumed to be implicit
for notational simplicity, and the following notation is used:
<tt>Sign(m) -&gt; (sig)</tt>. If the message <tt>m</tt> is comprised of multiple fields,
<tt>m1, m2, ..., mN</tt>, this is notated <tt>Sign(m) = Sign (m1, m2, ... mN) -&gt;
(sig)</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperability of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum transition
or use in long-term post-quantum deployment, hence the reference to
post-quantum algorithms through this document.  However, the majority of the
discussion in this document applies equally well to future transitions to
other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize a
signature that remains even if a component signature is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within the
digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in the
case of signature stripping.</t>
          </li>
          <li>
            <t>Stripping attack: A stripping attack refers to a case where an adversary
takes a message and hybrid signature pair and attempts to submit (a
potential modification of) the pair to a component algorithm verifier.  A
common example of a stripping attack includes a message and hybrid
signature, comprised of concatenated post-quantum and traditional
signatures, where an adversary simply removes the post-quantum component
signature and submits the message and traditional component signature to a
traditional verifier. Stripping attacks should not be confused with
component message forgery attacks.</t>
          </li>
          <li>
            <t>Component message forgery attacks: A forgery attack refers to a case where
an adversary attempts to forge a (non-hybrid) signature on a message using
the public key associated with a component algorithm. An common example of
such an attack would be a quantum attacker compromising the key associated
with a traditional component algorithm and forging a message and signature
pair.  Message forgery attacks may be formalized with experiments such as
EUF-CMA, while the difference introduced in component message forgery
attacks is that the key is accepted for both hybrid and single algorithm
use. Further discussions on this appear under <xref target="euf-cma-challenges"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at motivations for them. As many of the arguments hold
in general for hybrid algorithms, we again refer to
<xref target="I-D.ietf-tls-hybrid-design"/> that summarizes these well. In addition, we
explicate the motivation for hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (also known as CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, attacks against the next-generation
multivariate schemes Rainbow and GeMSS might raise concerns for
conservative adopters of other algorithms, which could hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks (e.g., component algorithm forgeries).
Thus, even in a relatively simple algorithm subtleties and caveats on
implementation and use can arise over time. Given the complexity of next
generation algorithms, the chance of such discoveries and caveats needs to
be taken into account.</t>
          <t>Of note, some next generation algorithms have received considerable
analysis attention, for example, following attention gathered during the
NIST Post-Quantum Cryptography Standardization Process <xref target="NIST_PQC_FAQ"/>.
Thus, if and when further information on caveats and implementation issues
come to light, it is more likely that vulnerabilities will represent a
weakening of security than a full "break". Such weakening may also be offset
if a hybrid approach has been used.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> has been used to illustrate
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. In terms of risk to data confidentiality
guarantees and therefore key exchange and KEM algorithms, application
of this equation is fairly straightforward. In contrast, it may not be
obvious why there is urgency for an adoption of post-quantum signatures;
namely, while encryption is subject to store-now-decrypt-later attacks,
a parallel notion for authenticity, i.e., 'store-now-modify-later attacks'
may not be readily apparent.</t>
          <t>However, in large systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term commitment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptographic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompasses more specific concepts of hybrid signature
security, such as 'hybrid unforgeability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where the
security assumption for the scheme, e.g. EUF-CMA, is maintained as long as at
least one of the component schemes is EUF-CMA secure without a
prioritisation. We call this notion 'hybrid unforgeability'; it is a specific
type of hybrid authentication. For example, the concatenation combiner in
<xref target="HYBRIDSIG"/> is 'hybrid unforgeable'. As mentioned above, this might be
incompatible with backward-compatibility, where the EUF-CMA security of the
hybrid signature relies solely on the security of one of the component
schemes instead of relying on both, e.g., the dual message combiner using
nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our discussion
below. Note that unlike EUF-CMA security, SUF-CMA security of the hybrid
scheme may rely on SUF-CMA security of both component schemes achieving
SUF-CMA, depending on the hybridization approach.  For instance, this can be
clearly seen under a concatenation combiner where the hybrid signature is
comprised of two distinct component signatures; in that case, if either
component signature does not offer SUF-CMA, the hybrid does not achieve
SUF-CMA.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security assumed
for only one component scheme generally use hybrid techniques for their
'functional transition' pathway support, while fully trusting either the
traditional or post-quantum algorithm. E.g., hybrid signatures may be used as
a transition step for when a system or system-of-systems is comprised of some
verifiers that support traditional signatures only while other verifiers are
upgraded to also support post-quantum signatures. In this example, a system
manager is using hybrid signatures as a 'functional transition' support, but
not yet expecting different security guarantees. As such, EUF-CMA security is
assumed for one component algorithm.</t>
            <t>In contrast, use cases where a hybrid scheme is used with e.g., EUF-CMA
security assumed for both component schemes without prioritisation between
them can use hybrid techniques for both functional transition and security
transition, where it may not be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc. Otherwise, an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee that
an adversary cannot simply “remove” one of the component signatures without
evidence left behind. For example, there are artifacts that a carefully
designed verifier may be able to identify, or that are identifiable in later
audits. This was later termed Weak Non-Separability (WNS)
<xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not restrict an adversary from
potentially creating a valid component digital signature from a hybrid one (a
signature stripping attack), but rather implies that such a digital signature
will contain artifacts of the separation. Thus, authentication that is
normally assured under correct verification of digital signature(s), is now
potentially also reliant on further investigation on the receiver side that
may extend well beyond traditional signature verification behavior. For
instance, this can intuitively be seen in cases of a message containing a
context note on hybrid authentication, that is then signed by all component
algorithms/the hybrid signature scheme. If an adversary removes one component
signature but not the other, then artifacts in the message itself point to
the possible existence of hybrid signature such as a label stating, “this
message must be hybrid signed”. This might be a counter measure against
stripping attacks if the verifier expects a hybrid signature scheme to have
this property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional signature
security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input a
hybrid signature (and message) and output a valid component signature (and
potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the
component signature will fail verification (of the component signature
scheme) entirely. Therefore, authentication is provided by the sender to the
receiver through correct verification of the digital signature(s), as in
traditional signature security experiments. It is not dependent on other
components, such as message content checking, or protocol level aspects, such
as public key provenance. As an illustrative example distinguishing WNS from
SNS, consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 =
Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m' =
(hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with the
hybrid artifact embedded in the message instead of the signature, could be
correctly verified. The separation would be identifiable through further
investigation, but the signature verification itself would not fail. Thus,
this case shows WNS (assuming the verification algorithm is defined
accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ietf-lamps-pq-composite-sigs"/> has looked at reliance on the
public key certificate chains to explicitly define hybrid use of the public
key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without <tt>Sigma_2.pk</tt>. This
implies pushing the hybrid artifacts into the protocol and system level and a
dependency on the security of other verification algorithms (namely those in
the certificate chain). This further requires that security analysis of a
hybrid digital signature requires analysis of the key provenance, i.e., not
simply that a valid public key is used but how its hybridization and hybrid
artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the scope of
the signature algorithm itself. SNS may potentially be achievable based on
dependencies at the system level.</t>
        </section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature may
be verified by only verifying one component signature, allowing the scheme to
be used by legacy receivers. In general, this means verifying the traditional
component signature scheme, potentially ignoring the post-quantum signature
entirely. This provides an option to transition sender systems to
post-quantum algorithms while still supporting select legacy
receivers. Notably, this is a verification property; the sender has provided
a hybrid digital signature, but the verifier is allowed, due to internal
policy and/or implementation, to only verify one component
signature. Backwards compatibility may be further decomposed to subcategories
where component key provenance is either separate or hybrid so as to support
implementations that cannot recognize (and/or process) hybrid signatures or
keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility assumes
that hybrid signature schemes will be used for some time, but that eventually
all systems will transition to use only one (particularly, only one
post-quantum) algorithm. As this is very similar to backwards compatibility,
it also may imply separability of a hybrid algorithm; however, it could also
simply imply capability to support separate component signatures. Thus, the
key distinction between backwards and forwards compatibility is that
backwards compatibility may be needed for legacy systems that cannot use
and/or process hybrid or post-quantum signatures, whereas in forwards
compatibility the system has those capabilities and can choose what to
support (e.g., for efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only is the entire hybrid signature
(e.g., all component signature elements) needed to achieve a successful
verification present in the signature presented for verification, but also
that verification of both component algorithms occurs roughly simultaneously.
Namely, "missing" information needs to be computed by the verifier so that a
normally functioning verification algorithm cannot “quit” the verification
process before the hybrid signature elements attesting for both component
algorithms are verified. This may additionally cover some error-injection and
similar attacks, where an adversary attempts to make an otherwise honest
verifier skip component algorithm verification. SV mimics traditional digital
signatures guarantees, essentially ensuring that the hybrid digital signature
behaves as a single algorithm vs. two separate component stages. Alternatively
phrased, under an SV guarantee it is not possible for an otherwise honest
verifier to initiate termination of the hybrid verification upon successful
verification of one component algorithm without also knowing if the other
component succeeded. Note that SV does not prevent dishonest verification,
such as if a verifier maliciously implements a customized verification
algorithm that is designed with intention to subvert the hybrid verification
process or skips signature verification altogether.</t>
        </section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined, based
on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be made
that is generalizable to all such signatures. Such generality can also result
in simplified constructions whereas more tailored hybrid variants might be
more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other cryptographic
components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature constructions are
expected to be as performant as possible. For most hybrid signatures this
means that the computation time should only minimally exceed the sum of the
component signature computation time. It is noted that performance of any
variety may come at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>, hybrid
signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts are
used), public keys, and the hybrid signature.  For the hybrid signature, size
should no more than minimally exceed the signature size of the two component
signatures. In some cases, it may be possible for a hybrid signature to be
smaller than the concatenation of the two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Duplicated information should be avoided when possible, as a general point of
efficiency. This might include repeated information in hybrid certificates or
in the communication of component certificates in additional to hybrid
certificates (for example, to achieve backwards/forwards-compatibility) or
sending multiple public keys or signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to detect
the change during verification. An example of this includes simple
concatenation of signatures without any artifacts used. Nested signatures
(where a message is signed by one component algorithm and then the
message-signature combination is signed by the second component algorithm)
may also fall into this category, dependent on whether the inner or outer
signature is stripped off without any artifacts remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is removed
artifacts of the hybrid will remain (in the message, signature, or at the
protocol level, etc.). This may enable the verifier to detect if a component
signature is stripped away from a hybrid signature, but that detectability
depends highly on the type of artifact and permissions.  For instance, if a
message contains a label artifact "This message must be signed with a hybrid
signature" then the system must be allowed to analyze the message contents
for possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy of the
protocol or application the hybrid signature is used in on the verifier
side. Such policies may be further ambiguous to the sender, meaning that the
type of authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting a new
message as the message/inner signature combination and verify only the outer
signature.  In this case, the inner signature is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the actual
message, the certificate, or in other non-signature components, this notion
more closely ties to traditional algorithm security notions (such as EUF-CMA)
where security is dependent on the internal construct of the signature
algorithm and its verification. In this type, the verifier can detect
artifacts on an algorithmic level during verification. For example, the
signature itself may encode the information that a hybrid signature scheme is
used. Examples of this type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds not
only when both of the component signatures are present but also only when the
verifier has verified both signatures. Moreover, no information is leaked to
the receiver during the verification process on the possible validity of the
component signatures until both verify (or verification failure may or may
not be attributable to a specific component algorithm). This construct most
closely mirrors traditional digital signatures where, assuming that the
verifier does verify a signature at all, the result is either a positive
verification of the full signature or a failure if the signature is not
valid. For fused hybrid signatures, a <tt>full signature</tt> implies the fusion of
both component algorithms, and therefore this type of construction has the
potential to achieve the strongest non-separability notion which ensures an
all-or-nothing approach to verification, regardless of adversarial
action. Examples of algorithms providing this type of security can be found
in <xref target="HYBRIDSIGDESIGN"/>.</t>
    </section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping attacks. This,
however, depends strongly on where such evidence resides (e.g., in the
message, the signature, or somewhere on the protocol level instead of at the
algorithmic level). Even commonly discussed hybrid approaches, such as
concatenation, are not inherently tied to one type of security (e.g., WNS or
SNS). This can lead to ambiguities when comparing different approaches and
assumptions about security or lack thereof. Thus, in this section we cover
artifact locations and also walk through a high-level comparison of a few
hybrid categories to show how artifact location can differ within a given
approach. Artifact location is tied to non-separability notions above; thus
the selection of a given security guarantee and general hybrid approach must
also include finer grained selection of artifact placement.</t>
      <section anchor="art-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the
message to the signature algorithm to the protocol level and even into
policy, as shown in <xref target="tab-artifact-location"/>.  For example, one artifact
location could be in the message to be signed, e.g., containing a label
artifact.  Depending on the hybrid type, it might be possible to strip this
away. For example, a quantum attacker could strip away the post-quantum
signature of a concatenated dual signature, and (being able to forge, e.g.,
ECDSA signatures) remove the label artifact from the message as well. So, for
many applications and threat models, adding an artifact in the message might
be insufficient under stripping attacks.  Another artifact location could be
in the public key certificates as described in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>. In such a case, the artifacts are still
present even if a stripping attack occurs. In yet another case, artifacts may
be present through the fused hybrid method, thus making them part of the
signature at the algorithmic level. Note that in this latter case, it is not
possible for an adversary to strip one of the component signatures or use a
component of the hybrid to create a forgery for a component algorithm. Such
signatures provide SNS. This consequently also implies that the artifacts of
hybridization are absolute in that verification failure would occur if an
adversary tries to remove them.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent on
system policy, then cryptographic analysis must necessarily be reliant on
specific policies, and it may not be possible to describe a scheme's security
in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in different
locations even within a single, common approach. We look at the following
categories of approaches: concatenation, nesting, and fusion.  This is to
illustrate that a given approach does not inherently imply a specific
non-separability notion and that there are subtleties to the selection
decision, since hybrid artifacts are related to non-separability guarantees.
Additionally, this comparison highlights how artifacts placement can be
identical in two different hybrid approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation, nesting,
and fusion) for clarity in description, before showing how each one may have
artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated as a
concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 = Sigma_1.Sign(hybridAlgID,
m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.</t>
          </li>
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in a
layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly separated
to form one or more valid component constructs. For example, if both
signature schemes are signatures schemes constructed through the Fiat-Shamir
transform, the component signatures would include responses r_1 and r_2 and
challenges c_1 and c_2, where c_1 and c_2 are hashes computed over the
respective commitments comm_1 and comm_2 (and the message).  A fused hybrid
signature could consist of the component responses, r_1 and r_2 and a
challenge c that is computed as a hash over both commitments, i.e., c =
Hash((comm_1, comm_2), Hash2(message)).  As such, c does not belong to either
of the component signatures but rather both, meaning that the signatures are
'entangled'.</t>
          </li>
        </ul>
        <table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type of
combiner, there are in fact several possible artifact locations depending on
implementation choices. Artifacts help to support detection in the case of
stripping attacks, which means that different artifact locations imply
different overall system implementation considerations to be able to achieve
such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as there are
no prescribed artifacts and therefore non-separability is not achieved.
However, as can be seen, this does not imply that every implementation using
concatenation fails to achieve non-separability. Thus, it is advisable for
implementors to be transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable as the
authenticity of the message relies on the validity of the signature, and the
artifact location means that the signature in turn relies on the authentic
content of the message (the artifact label). This creates a risk of circular
dependency. Alternative approaches such as cases 3 and 4 solve this circular
dependency by provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may be
similar among some approaches. For instance, case 3 and case 6 both contain
artifacts in the certificate. Naturally these examples are high-level and
further specification on concrete schemes in the categories are needed before
prescribing non-separability guarantees to each, but this does indicate how
there could be a strong similarity between such guarantees.  Such comparisons
allow for a systematic decision process, where security is compared and
identified and, if schemes are similar in the desired security goal, then
decisions between schemes can be based on performance and implementation
ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire chain
must then also use a similar combiner if a straightforward security argument
is to be made. Other cases, such as 8, 9, 10, and 11 put artifacts within the
signature itself, meaning that these bear the closest resemblance to
traditional schemes where message authenticity is dependent on signature
validity.</t>
      </section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the case of
FIPS approval considerations as well as NIST, which has provided basic
guidance on hybrid signature use. NIST provides the following guidance
(emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making an <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using an <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to approved
(or even existing) signature schemes. Such a new, singular algorithm relies
on both traditional and next-gen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security of
the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm implementation
in a black-box way. It may potentially change the specifics of the other
component algorithm implementations. As long as at least one component is
approved, no new approval is needed (per <xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
black-box way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as at
least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus, as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Unforgeability properties for hybrid signature schemes are more nuanced than
for single-algorithm schemes.</t>
      <t>Under the traditional EUF-CMA security assumption, an adversary can request
signatures for messages of their choosing and succeeds if they are able to
produce a valid signature for a message that was not part of an earlier
request. EUF-CMA can be seen as applying to the hybrid signature scheme in
the same way as single-algorithm schemes. Namely, the most straightforward
extension of the traditional EUF-CMA security game would be that an adversary
can request hybrid signatures for messages of their choosing and succeeds if
they are able to produce a valid hybrid signature for a message that was not
part of an earlier request. However, this has several layers of
nuance under a hybrid construct.</t>
      <t>Consider for example a simplistic hybrid approach using concatenated component
algorithms. If the hybrid signature is stripped, such that a single component
signature is submitted to a verification algorithm for that component along
with the message that was signed by the hybrid, the result would be an EUF-CMA
forgery for the component signature. This is becasue as the component signing
algorithm was not previously called for the message - the hybrid signing
algorithm was used to generate the signature. This is an example of a component
algorithm forgery, a.k.a. a case of cross-algorithm attack or cross-protocol
attack.</t>
      <t>The component algorithm forgery verifier target does not need to be the
intended recipient of the hybrid-signed message and may even be in an
entirely different system. This vulnerability is particularly an issue among
concatenated or nested hybrid signature schemes when component
verification. It should be noted that policy enforcement of a hybrid
verification does not mitigate the issue on the intended message recipient:
the component forgery could occur on any system that accepts the component
keys.</t>
      <t>Thus, if EUF-CMA security for hybrids is considered to be informally defined in
the straightfoward way as that an adversary can request hybrid signatures for
messages of their choosing and succeeds if they are able to produce a valid
hybrid signature for a message that was not part of an earlier request,
implicit requirements must hold in order to avoid real-world implications.
Namely, either component algorithm forgeries, a.k.a. cross-protocol attacks,
must be out of scope for the use case or or the hybrid signature choice must be
strongly non-separable. Otherwise, component algorithm forgeries, which can be
seen as a type of cross-protocol attack, affect the type of EUF-CMA properties
offered and are a practical consideration that system designers and managers
should be aware of when selecting among hybrid approaches for their use case.</t>
      <t>There are a couple approaches to alleviating this issue, as noted above.
One is on restricting key reuse. As described in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>, prohibiting hybrid algorithm and component
algorithm signers and verifiers from using the same keys can help ensure that a
component verifier cannot be tricked into verifying the hybrid signature. This
would effectively put component forgeries out of scope for a use case. One means
for restricting key reuse is through allowed key use descriptions in
certificates. While prohibiting key reuse reduces the risk of such component
forgeries, and is the mitigation described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>,
it is still a policy requirement and not a cryptographic assurance. Component
forgery attacks may be possible if the policy is not followed or is followed
inconsistently across all entities that might verify signatures using those keys.
This needs to be accounted for in any security analysis. Since cryptographic
provable security modeling has not historically accounted for key reuse in this
way, it should not be assumed that systems with existing analyses are robust
to this issue.</t>
      <t>The other approach noted for alleviating the component forgery risk is through
hybrid signature selection of a scheme that provides strong non-separability.
Under this approach, the hybrid signature cannot be separated into component
algorithm signatures that will verify correctly, thereby preventing the signature
separation required for the component forgery attack to be successful.</t>
      <t>It should be noted that weak non-separability is insufficient for mitigating
risks of component forgeries. As noted in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, in
cases hybrid algorithm selection that provides only weak non-separability key
reuse should be avoided, as mentioned above, to mitigate risks of introducing
EUF-CMA vulnerabilities for component algorithms.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an informational document and does not directly
affect any other Internet draft. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="advantages-disadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS</name>
        <t>There is an inherent mutual exclusion between backwards compatibility and
SNS.  While WNS allows for a valid separation under leftover artifacts, SNS
will ensure verification failure if a receiver attempts separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process hybrid
signatures, all differences between the legacy signature format and the
hybrid signature format must be allowed to be ignored, including skipping
verification of signatures additional to the classical signature. As such, if
a system does skip a component signature, security does not rely on the
security of all component signatures. Note that this mutual exclusion occurs
at the verification stage, as a hybrid signature that is verified by a system
that can process both component schemes can provide hybrid unforgeability
even if another (legacy) system, processing the same hybrid signature, loses
that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval</name>
        <t>It seems that the more simultaneous verification is enforced by the hybrid
design, the higher is the need-for-approval as simultaneous verification
algorithms fuse (or 'entangle') the verification of the component algorithms
such that verification operations from the different component schemes depend
on each other in some way. For example, concatenation of signatures in a
black-box way without any artefacts is, e.g., FIPS-approved, but the
component signatures are usually verified separately and no 'simultaneous
verification' is enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this document forward, offered useful
insights and perspectives, and/or stimulated work in the area:</t>
      <t>D.J. Bernstein, Scott Fluhrer, Felix Günther, John Gray, Serge Mister,
Max Pala, Mike Ounsworth, Douglas Stebila, Falko Strenzke, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HQC_CVE" target="https://nvd.nist.gov/vuln/detail/CVE-2024-54137">
        <front>
          <title>Correctness error in HQC decapsulation</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="December" day="06"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="October" year="2024"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Michael P" initials="M." surname="P">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <author fullname="Britta Hale" initials="B." surname="Hale">
            <organization>Naval Postgraduate School</organization>
          </author>
          <date day="11" month="December" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-05"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>Bundesdruckerei GmbH</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <date day="21" month="October" year="2024"/>
          <abstract>
            <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="KYBERSLASH" target="https://eprint.iacr.org/2024/1049">
        <front>
          <title>KyberSlash: Exploiting secret-dependent division timings in Kyber implementations</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="June" day="30"/>
        </front>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="QRCSP" target="https://cr.yp.to/papers/qrcsp-20231124.pdf">
        <front>
          <title>Quantifying risks in cryptographic selection processes</title>
          <author initials="D." surname="Bernstein" fullname="Daniel J. Bernstein">
            <organization/>
          </author>
          <date year="2023" month="November" day="24"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
