<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-ipsecme-pqt-hybrid-auth-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="IKEv2 PQ/T Hybrid Auth">Hybrid Post-Quantum and Traditional Authentication for IKEv2</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-ipsecme-pqt-hybrid-auth-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author initials="S." surname="Fluhrer" fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="14"/>
    <area>Security</area>
    <workgroup>IP Security Maintenance and Extensions</workgroup>
    <keyword>Post-Quantum</keyword>
    <keyword>Hybrid Authentication</keyword>
    <keyword>IKEv2</keyword>
    <abstract>
      <?line 60?>

<t>A Cryptographically Relevant Quantum Computer (CRQC) can break traditional public-key algorithms (e.g., RSA, ECDSA), which are typically used for authentication in IKEv2. Combining the post-quantum ML-DSA signature algorithm with a traditional signature algorithm provides protection against potential weaknesses or implementation flaws in ML-DSA. This draft defines a hybrid PKI authentication method for IKEv2 using composite certificates that ensures authentication remains secure as long as at least one of the component signature algorithms remains unbroken.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tireddy2.github.io/ipsecme-pqt-hybrid/draft-reddy-ipsecme-pqt-hybrid-auth.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-ipsecme-pqt-hybrid-auth/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IP Security Maintenance and Extensions Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tireddy2/ipsecme-pqt-hybrid"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), uncertainty remains regarding the long-term security of both traditional and PQC algorithms. Hybrid approaches allow deployments to mitigate risk during this transition period.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms such that a successful forgery requires breaking each of the component signature algorithms used in the hybrid construction.</t>
      <t>This document defines a hybrid authentication mechanism for IKEv2 that combines traditional and post-quantum (PQC) signature algorithms using composite certificates. The security objective of this mechanism is that authentication remains secure as long as at least one of the component signature algorithms in the hybrid construction remains secure against forgery.</t>
      <t>The mechanism specified in this document provides a general framework for combining PQC and traditional signature algorithms in IKEv2. Although this document primarily describes combinations involving ML-DSA <xref target="ML-DSA"/> variants and traditional algorithms, the framework is not limited to ML-DSA and can accommodate other PQC and traditional signature algorithm combinations.</t>
      <t>The deployment model specified is:</t>
      <t>Composite Certificate:
   A single certificate containing a composite public key and composite signature, as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. In this model, a single certificate chain and a single AUTH payload are used to provide hybrid authentication assurance.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Cryptographically Relevant Quantum Computer (CRQC): A quantum computer that is capable of breaking real-world cryptographic systems.</t>
      <t>Post-Quantum Cryptographic (PQC) algorithms: Asymmetric cryptographic algorithms designed to resist attacks by cryptographically relevant quantum computers (CRQC).</t>
      <t>Traditional Cryptographic algorithms: Existing asymmetric Cryptographic  algorithms could be broken by CRQC, like RSA, ECDSA, etc.</t>
    </section>
    <section anchor="ikev2-key-exchange">
      <name>IKEv2 Key Exchange</name>
      <t>When hybrid authentication is used to achieve post-quantum security goals, the key exchange mechanism should provide comparable post-quantum resilience; otherwise, the overall security of the IKE SA will still depend on the traditional key exchange.</t>
    </section>
    <section anchor="exchanges">
      <name>Exchanges</name>
      <t>The hybrid authentication exchanges are illustrated in <xref target="hybrid-auth-figure"/>, using an ML-KEM key exchange carried in an IKE_SA_INTERMEDIATE exchange as defined in <xref target="RFC9242"/>. The key exchange mechanism is independent of the authentication mechanism defined in this document.</t>
      <figure anchor="hybrid-auth-figure">
        <name>Hybrid Authentication Exchanges with ML-KEM via IKE_SA_INTERMEDIATE</name>
        <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SAi1, KEi, Ni -->
                  <--  HDR, SAr1, KEr, Nr, [CERTREQ,]
                                      N(SUPPORTED_AUTH_METHODS)

HDR, SK {INTERMEDIATE KEi, Ni} -->
                  <--  HDR, SK {INTERMEDIATE KEr, Nr}

HDR, SK {IDi, CERT+, [CERTREQ,]
        [IDr,] AUTH, SAi2,
        TSi, TSr,
        N(SUPPORTED_AUTH_METHODS)} -->
                            <--  HDR, SK {IDr, CERT+, [CERTREQ,]
                                      AUTH}
-------------------------------------------------------------------
]]></artwork>
      </figure>
    </section>
    <section anchor="composite-certificate">
      <name>Composite Certificate</name>
      <t>This draft extends and complements <xref target="PQC-AUTH"/> which defines how to use Post-Quantum Cryptographic (PQC) signature algorithms (such as ML-DSA and SLH-DSA) in IKEv2 authentication. Both drafts share the same overarching goal:</t>
      <t>Enable IKEv2 to authenticate peers using PQC signature algorithms, ensuring security against quantum-capable adversaries.</t>
      <t>Whereas <xref target="PQC-AUTH"/> specifies PQC-only authentication, this draft specifies how to deploy PQC and traditional algorithms together to provide hybrid assurance during the migration phase.</t>
      <t>Both drafts:</t>
      <ul spacing="normal">
        <li>
          <t>Do not require any changes to IKEv2 base protocol messages.</t>
        </li>
        <li>
          <t>Rely on the standard IKEv2 AUTH payload format <xref target="RFC7296"/>.</t>
        </li>
        <li>
          <t>Use SUPPORTED_AUTH_METHODS (<xref target="RFC9593"/>). In this case, the IKEv2 peers use the SUPPORTED_AUTH_METHODS notification to advertise supported composite signature algorithms.</t>
        </li>
      </ul>
      <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method replaces older signature authentication methods. Both standalone PQC signature algorithms and composite signature algorithms can be incorporated using the "Signature Algorithm" field in the AUTH payload, as defined in <xref target="RFC7427"/>.</t>
      <t>For composite signatures, a single AlgorithmIdentifier describes a composite public key and a composite signature that combines multiple constituent algorithms (e.g., a traditional and a PQC algorithm) in accordance with <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. This allows a single certificate and AUTH payload to provide hybrid assurance without requiring multiple exchanges.</t>
      <t>AlgorithmIdentifier ASN.1 objects are used to uniquely identify composite schemes, including the full parameter set for each constituent algorithm. This ensures unambiguous selection and verification of composite signature during authentication.</t>
      <section anchor="composite-certificate-processing">
        <name>Composite Certificate Processing</name>
        <t>Authentication using composite certificates follows the generic digital signature authentication method defined in <xref target="RFC7427"/> and the AUTH computation defined in Section 2.15 of <xref target="RFC7296"/>. If one or more IKE_SA_INTERMEDIATE exchanges occurred, the signed octets are constructed as specified in <xref target="RFC9242"/>.</t>
        <t>The end-entity certificate <bcp14>MUST</bcp14> contain a composite public key as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. The composite signature algorithm used in the AUTH payload <bcp14>MUST</bcp14> correspond to the composite public key algorithm in the certificate. A mismatch between the AUTH signature algorithm and the certificate public key algorithm <bcp14>MUST</bcp14> cause the IKE_SA negotiation to fail.</t>
        <t>Signature generation and verification are performed using the composite signature scheme as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. Any internal hashing or message preprocessing is performed as specified by that document.</t>
      </section>
    </section>
    <section anchor="ikev2-fragmentation">
      <name>IKEv2 Fragmentation</name>
      <t>Post-quantum signature algorithms and certificate chains may significantly increase the size of IKE_AUTH messages. Implementations supporting the mechanisms defined in this document <bcp14>MUST</bcp14> support IKEv2 Fragmentation as defined in <xref target="RFC7383"/>.</t>
    </section>
    <section anchor="negotiation">
      <name>Negotiation</name>
      <t>Note: currently, this section talks mostly about the problems that we'll need to address.
Eventually, it'll be updated to talk about the actual mechanism, including the bits-on-the-wire format.</t>
      <t>To support brown field upgrades, we will need for an IKE device to be able to support negotiating with devices with only conventional (e.g. RSA) certificates, and with devices with composite certificates (e.g. RSA and ML-DSA).
In addition, for the network to be entirely post-quantum safe, devices will need to be able to mandate that composite certificates be used.
Furthermore, it would be cleaner if the device sent its policy upfront to the peer, rather than letting it try to negotiate and failing.</t>
      <t>For composite certificates, this is straight-forward. A composite certificate can be listed in the SUPPORTED_AUTH_METHODS list as yet another algorithm.
A device can decide to list support for both that and RSA, or it could decide to list only support for composite certificates.
The existing mechanism in IKE will cleanly decide which is appropriate.
The only remaining issue is one of preference (if we have multiple algorithm OIDs that are acceptable to the peer, which one should we use).
This is not a security issue; instead, it is a performance issue (preferring composite would allow us to find performance problems earlier).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The hybrid mechanism defined in this document aims to provide authentication security as long as at least one component signature algorithm remains secure against forgery.</t>
      <t>The security of general PQ/T hybrid authentication is discussed in <xref target="RFC9794"/>. This document relies on mechanisms defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, <xref target="RFC7427"/>, and <xref target="RFC9593"/>, and the security considerations of those specifications need to be taken into account.</t>
      <t>Traditional signature algorithms such as ECDSA, Ed25519, and Ed448 provide existential unforgeability under chosen-message attack (EUF-CMA), which is sufficient for IKEv2 authentication. When used as the traditional component in a composite construction with ML-DSA, these algorithms contribute to defense-in-depth during the transition to post-quantum cryptography, maintaining IKEv2 authentication security as long as at least one component algorithm remains secure.</t>
      <t>However, composite signature schemes do not in general preserve strong unforgeability (SUF-CMA) once the traditional component algorithm is broken, for example due to the availability of CRQCs. In such cases, a forged traditional signature component can be combined with a valid post-quantum component to produce a composite signature that verifies successfully, violating SUF. This loss of SUF is inherent to the composite construction and does not impact IKEv2, which relies only on the composite signature verification result.</t>
      <section anchor="downgrade-considerations">
        <name>Downgrade Considerations</name>
        <t>The AUTH computation in IKEv2 signs the IKE_SA_INIT exchange as specified in Section 2.15 of <xref target="RFC7296"/>. Therefore, negotiation signals exchanged during IKE_SA_INIT (such as <tt>SUPPORTED_AUTH_METHODS</tt> <xref target="RFC9593"/>) are cryptographically bound to the authentication exchange and cannot be modified by an active attacker without causing authentication failure.</t>
        <t>If hybrid authentication is required by local policy, implementations <bcp14>MUST</bcp14> enforce that the negotiated authentication method satisfies that policy.</t>
        <t>Specifically, if composite authentication is required, receipt of a non-composite certificate or non-composite signature algorithm during IKE_AUTH <bcp14>MUST</bcp14> cause the IKE_SA negotiation to fail.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>None.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite Module-Lattice-Based Digital Signature Algorithm (ML-DSA) for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="9" month="April" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST Module-Lattice-Based
   Digital Signature Algorithm (ML-DSA) in hybrid with traditional
   algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519, and Ed448.
   These combinations are tailored to meet regulatory guidelines in
   certain regions.  Composite ML-DSA is applicable in applications that
   use X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where existential unforgeability (EUF-CMA) level
   security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-18"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC9242">
          <front>
            <title>Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document defines a new exchange, called "Intermediate Exchange", for the Internet Key Exchange Protocol Version 2 (IKEv2). This exchange can be used for transferring large amounts of data in the process of IKEv2 Security Association (SA) establishment. An example of the need to do this is using key exchange methods resistant to Quantum Computers (QCs) for IKE SA establishment. The Intermediate Exchange makes it possible to use the existing IKE fragmentation mechanism (which cannot be used in the initial IKEv2 exchange), helping to avoid IP fragmentation of large IKE messages if they need to be sent before IKEv2 SA is established.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9242"/>
          <seriesInfo name="DOI" value="10.17487/RFC9242"/>
        </reference>
        <reference anchor="RFC7383">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages. This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="PQC-AUTH">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2026"/>
            <abstract>
              <t>   Signature-based authentication methods are utilized in IKEv2.  The
   current version of the Internet Key Exchange Version 2 (IKEv2)
   protocol, specified in RFC 7296, supports traditional digital
   signatures.

   This document specifies a generic mechanism for integrating post-
   quantum cryptographic (PQC) digital signature algorithms into the
   IKEv2 protocol.  The approach allows for seamless inclusion of any
   PQC signature scheme within the existing authentication framework of
   IKEv2.  Additionally, it outlines how Module-Lattice-Based Digital
   Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-
   DSA), can be employed as authentication methods within the IKEv2
   protocol, as they have been standardized by NIST.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-08"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/ipd">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS-204"/>
          <seriesInfo name="State" value="Initial Public Draft"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
      </references>
    </references>
    <?line 210?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
