<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PQC Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-08"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="14"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 86?>

<t>Signature-based authentication methods are utilized in IKEv2. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol, specified in RFC 7296,  supports traditional digital signatures.</t>
      <t>This document specifies a generic mechanism for integrating post-quantum cryptographic (PQC) digital signature algorithms into the IKEv2 protocol. The approach allows for seamless inclusion of any PQC signature scheme within the existing authentication framework of IKEv2. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol, as they have been standardized by NIST.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 92?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec. In the IKE_AUTH exchange, the initiator and responder independently select and use their preferred authentication method, which may differ between peers. The most common authentication method is digital signatures using asymmetric cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC4754"/>,
and Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8420"/>.</t>
      <t>The existence of a Cryptographically Relevant Quantum Computer (CRQC) would render traditional asymmetric algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the existence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are asymmetric algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines a general approach to incorporating PQC digital signature algorithms into IKEv2 while maintaining interoperability and backward compatibility, as it does not change the IKEv2 protocol but adds negotiable PQC signature algorithms. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> can be employed as authentication methods within IKEv2, as they have been standardized the US National Institute of Standards and Technology (NIST) PQC project.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in Terminology for Post-Quantum Traditional Hybrid Schemes <xref target="RFC9794"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="general-framework-for-pqc-authentication-in-ikev2">
      <name>General Framework for PQC Authentication in IKEv2</name>
      <t>IKEv2 authentication commonly relies on digital signatures to verify the identity of communicating peers. The mechanism described in this document enables the use of any PQC digital signature algorithm without modifying core IKEv2 operations.</t>
      <section anchor="specifying-pqc-signature-algorithms">
        <name>Specifying PQC Signature Algorithms</name>
        <ul spacing="normal">
          <li>
            <t>IKEv2 can use arbitrary signature algorithms as described in Signature Authentication in IKEv2 <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. Any PQC digital signature algorithm can be incorporated using the "Digital Signature" authentication method, as defined in <xref target="RFC7427"/>.</t>
          </li>
          <li>
            <t>DER encoded AlgorithmIdentifier ASN.1 objects will be used to uniquely identify PQC signature algorithm scheme and the parameter set associated with it. The AlgorithmIdentifier ASN.1 object is placed in the Authentication Data field of the Authentication payload (see Figure 2 of <xref target="RFC7427"/> for details).</t>
          </li>
        </ul>
      </section>
      <section anchor="sig">
        <name>Signature Generation and Verification</name>
        <t>PQC signatures may be generated in either deterministic or hedged modes. The terms deterministic and hedged used in this document are in accordance with ML-DSA <xref target="FIPS204"/> and SLH-DSA <xref target="FIPS205"/>, which define the ML-DSA and SLH-DSA algorithms. Future PQC signature algorithms may adopt different nomenclature, but will be expected to follow the same principles.</t>
        <t>In the deterministic mode, the signature is derived entirely from the message and the signer’s private key, without introducing fresh randomness at signing time. While this eliminates reliance on an external random number generator (RNG), it increases susceptibility to side-channel attacks, particularly fault injection attacks.</t>
        <t>The hedged mode provides some resistance against this risk by including precomputed randomness in the signer's private key and incorporating fresh randomness generated at signing time.
This foils some side channel attack approaches, while adding no additional strength against others.
If protection against side-channel attacks are required, an ML-DSA implementation that implements side-channel resistance should be used.</t>
        <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each session, as it includes session-specific information such as nonces. PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between deterministic and hedged signing modes does not impact interoperability because the verification process remains the same for both variants.</t>
        <t>If the PQC signature algorithm uses a 'context' input parameter, it <bcp14>MUST</bcp14> be set to an empty string.</t>
        <t>Certain digital signature algorithms support two modes: "pure" mode and "pre-hash" mode. For example, ML-DSA and
SLH-DSA support both modes. In pure mode, the content is signed directly along with some domain separation
information. In contrast, pre-hash mode involves signing a digest of the message. This document specifies the use
of pure mode for signature-based authentication in IKEv2, where the message is signed directly along with domain separation information. The data used for authentication in IKEv2, as described in Section 2.15 of IKEv2 <xref target="RFC7296"/>, consists of elements such as nonces, SPIs, and initial exchange messages (messages preceding IKE_AUTH), which are typically within device memory constraints.</t>
        <section anchor="handsig">
          <name>Handling PQC Signatures in IKEv2</name>
          <t>As specified in Signature Authentication in IKEv2 <xref target="RFC7427"/>, both the initiator and responder <bcp14>MUST</bcp14> send the SIGNATURE_HASH_ALGORITHMS notify payload in the IKE_SA_INIT exchange to indicate the set of hash algorithms they support for signature generation and verification. The SIGNATURE_HASH_ALGORITHMS notify payload contains a list of 2-octet hash algorithm identifiers, defined in the IANA "IKEv2 Hash Algorithms" registry.</t>
          <t>For PQC signature algorithms that inherently operate directly on the raw message without hashing, such as ML-DSA and SLH-DSA, only the 'Identity' hash function is applicable. The 'Identity' hash function (value 5) is defined in Section 2 of using EdDSA in IKEv2 <xref target="RFC8420"/> and indicates that the input message is used as-is, without any hash function applied. Therefore, implementations supporting such PQC signature algorithms <bcp14>MUST</bcp14> include the 'Identity' hash (5) in the SIGNATURE_HASH_ALGORITHMS notify. Furthermore, PQC signature algorithms requiring the 'Identity' hash <bcp14>MUST NOT</bcp14> be used with a peer that has not indicated support for the Identity hash in its notify payload.</t>
          <t>When generating a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signer as the message to be signed (with empty context string, if applicable). The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
          <t>When verifying a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signature verifier as the message to be verified (with empty context string, if applicable).</t>
          <t>IKEv2 peers supporting the PQC authentication mechanism defined in this specification <bcp14>SHOULD</bcp14> implement IKEv2 message fragmentation <xref target="RFC7383"/>, unless IKEv2 runs over a reliable transport (e.g., <xref target="RFC9329"/>) or the underlying network is known to support sufficiently large MTUs without fragmentation issues, since PQC public keys and signatures can be significantly larger than those used in traditional algorithms. 
For example, ML-DSA-44 requires a public key of 1,312 bytes and a signature of 2,420 bytes, while even the smallest SLH-DSA signature is around 7,856 bytes. As guidance, IKEv2 peers should assume a minimum PMTU of 1280 bytes for IPv6 (per <xref target="RFC8200"/>) and, where legacy IPv4 networks are a consideration, an effective MTU of 576 bytes for IPv4 (per <xref target="RFC1122"/>).</t>
        </section>
      </section>
      <section anchor="mechanisms-for-signaling-supported-key-pair-types">
        <name>Mechanisms for Signaling Supported Key Pair Types</name>
        <t>The following mechanisms can be used by peers to signal the types of digital signature algorithms and parameters they support:</t>
        <ul spacing="normal">
          <li>
            <t>Certificate Request Payload: One method to ascertain that the key pair type the <br/>
initiator wants the responder to use is through a Certificate Request payload (defined in Section 3.7 of IKEv2 <xref target="RFC7296"/>) sent by the initiator. For example, the initiator can specify that it trusts certificates issued by a certificate authority (CA) that signs with a particular post-quantum cryptographic (PQC) signature algorithm. This implies that the initiator can process signatures generated using that algorithm, thereby allowing the responder to authenticate itself using a key pair associated with the specified PQC signature scheme.</t>
          </li>
          <li>
            <t>Authentication Method Announcement: Using Announcing Supported Authentication Method in IKEv2 <xref target="RFC9593"/>, which enables peers to declare their supported authentication methods. This improves interoperability when IKEv2 peers are configured with multiple credential types of different type to authenticate each other. The responder includes a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message, listing the  signature scheme(s) it supports under the Digital Signature authentication method. The initiator includes the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or in the IKE_INTERMEDIATE request. This notification lists the digital signature scheme(s) supported by the initiator, ordered by preference.</t>
          </li>
        </ul>
        <t>In traditional IKEv2 deployments, peers often implicitly know the signature algorithms in use based on pre-configured certificates, trusted CAs, and IKEv2 policies. However, cryptographic agility, the ability to negotiate and use different cryptographic algorithms is gaining increased attention for ensuring long-term security and interoperability. This requirement becomes even more relevant with the introduction of PQC algorithms, where multiple signature algorithms with varying security levels and performance characteristics may need to be supported over time.</t>
      </section>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky that leverages rejection sampling to render lattice- based FS schemes compact and secure. ML-DSA uses a uniform distribution over small integers for computing coefficients in error vectors, which simplifies implementation compared to schemes requiring discrete Gaussian sampling.</t>
      <t>ML-DSA is instantiated with three parameter sets for the security categories 2, 3, and 5 (see Table 2 in Section 10 of PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>). Security properties of ML-DSA are discussed in Section 9 of PKIX Algorithm Identifiers for ML-DSA <xref target="RFC9881"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87. The DER encodings of the AlgorithmIdentifier objects for ML-DSA-44, ML-DSA-65, and ML-DSA-87 are listed in <xref target="ASN"/>.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms such as XMSS <xref target="RFC8391"/> or HSS/LMS <xref target="RFC8554"/>, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide AES-128, AES-192, and AES-256 bits of security respectively (see Table 2 in Section 10 of PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>). This document specifies the use of the SLH-DSA algorithm in IKEv2 at each level.</t>
      <t>Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained  IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and both SHA-256 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels. Those hash function selections are internal to SLH-DSA implementations, and are not to be confused with those in the SIGNATURE_HASH_ALGORITHMS notification payload.</t>
      <t>ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme in the face of a CRQC. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
      <t>The DER encodings of the AlgorithmIdentifier objects for each SLH-DSA variant are listed in <xref target="ASN"/>.</t>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and hedged signing modes, where the hedged signing modes includes fresh randomness in the signing procedure.
IKEv2 peers can use either mode of ML-DSA and SLH-DSA for authentication in IKEv2, with a preference for using the hedged mode (<xref target="sig"/>).</t>
      <t>The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in NIST <xref target="CSOR"/> and referenced in PKIX Algorithm Identifiers for the ML-DSA <xref target="RFC9881"/>. <xref target="FIPS204"/> defines both a pure and a pre-hash variant of ML-DSA, but PKIX Algorithm Identifiers for the ML-DSA <xref target="RFC9881"/> specifies only the pure variant.</t>
      <t>The different parameter sets of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in NIST <xref target="CSOR"/> and referenced in PKIX Algorithm
Identifiers for the SLH-DSA <xref target="RFC9909"/>. <xref target="FIPS205"/> defines two signature modes: pure mode and pre-hash mode. PKIX Algorithm Identifiers for the SLH-DSA <xref target="RFC9909"/> specifies the use of both Pure SLH-DSA and HashSLH-DSA in Public Key Infrastructure X.509 (PKIX) certificates and Certificate Revocation Lists (CRLs).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC signature algorithms are generally modeled to achieve strong unforgeability under adaptive chosen-message attacks (SUF-CMA; see Section 10.1.1 of PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>). For example, ML-DSA provides SUF-CMA security. However, some algorithms, such as SLH-DSA, achieve existential unforgeability under chosen-message attacks (EUF-CMA; see Section 10.1.1 of PQC for Engineers <xref target="I-D.ietf-pquip-pqc-engineers"/>). This distinction does not impact IKEv2, as the signed data in each session is unique due to the inclusion of nonces. Consequently, the oracle-based forgery attack scenarios in the EUF-CMA model do not arise in IKEv2.</t>
      <t>Different PQC signature schemes are designed to provide security levels comparable to well-established cryptographic primitives. For example, some schemes align with the NIST post-quantum security categories (Categories 1 through 5) as discussed in ML-DSA  <xref target="FIPS204"/> and SLH-DSA <xref target="FIPS205"/>. These categories specify target security strengths that correspond approximately to exhaustive key-search resistance for AES-128, AES-192, and AES-256, and collision-search resistance for SHA-256, SHA-384, and SHA-512. The choice of a PQC signature algorithm should be guided by the desired security level and performance requirements.</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256 collision resistance (which is a harder problem than AES-128 key search), AES-192 key search, and AES-256 key search, respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of PKIX Algorithm Identifiers for ML-DSA <xref target="RFC9881"/> and PKIX Algorithm Identifiers for SLH-DSA <xref target="RFC9909"/> apply to this specification as well.</t>
      <t>SLH-DSA keys are limited to 2^64 signatures. This upper bound is so large that even a IKEv2 server establishing IKEv2 sessions at an extremely high rate could not realistically reach it (at 10 billion signatures per second, it would still take over 58 years). The limit is therefore of theoretical interest only, but implementations may still track signature usage as a precautionary security measure. ML-DSA does not have a built-in signature limit, allowing for an arbitrary number of signatures to be made with the same key.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, Dan Wing, Wang Guilin, Rebecca Guthrie, Jonathan Hammell, John Mattsson, Tero Kivinen
and Daniel Van Geest for the discussion and comments.</t>
      <!-- Start of Appendices -->

</section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CSOR" target="https://csrc.nist.gov/projects/computer-security-objects-register/algorithm-registration">
          <front>
            <title>Computer Security Objects Register</title>
            <author initials="" surname="NIST" fullname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2024" month="August" day="20"/>
          </front>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7383">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages. This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4754">
          <front>
            <title>IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="D. Fu" initials="D." surname="Fu"/>
            <author fullname="J. Solinas" initials="J." surname="Solinas"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document describes how the Elliptic Curve Digital Signature Algorithm (ECDSA) may be used as the authentication method within the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols. ECDSA may provide benefits including computational efficiency, small signature sizes, and minimal bandwidth compared to other available digital signature methods. This document adds ECDSA capability to IKE and IKEv2 without introducing any changes to existing IKE operation. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4754"/>
          <seriesInfo name="DOI" value="10.17487/RFC4754"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="RFC9329">
          <front>
            <title>TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document describes a method to transport Internet Key Exchange Protocol (IKE) and IPsec packets over a TCP connection for traversing network middleboxes that may block IKE negotiation over UDP. This method, referred to as "TCP encapsulation", involves sending both IKE packets for Security Association (SA) establishment and Encapsulating Security Payload (ESP) packets over a TCP connection. This method is intended to be used as a fallback option when IKE cannot be negotiated over UDP.</t>
              <t>TCP encapsulation for IKE and IPsec was defined in RFC 8229. This document clarifies the specification for TCP encapsulation by including additional clarifications obtained during implementation and deployment of this method. This documents obsoletes RFC 8229.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9329"/>
          <seriesInfo name="DOI" value="10.17487/RFC9329"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC9881">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="J. Massimo" initials="J." surname="Massimo"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="B. E. Westerbaan" initials="B. E." surname="Westerbaan"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>Digital signatures are used within X.509 certificates and Certificate Revocation Lists (CRLs), and to sign messages. This document specifies the conventions for using FIPS 204, the Module-Lattice-Based Digital Signature Algorithm (ML-DSA) in Internet X.509 certificates and CRLs. The conventions for the associated signatures, subject public keys, and private key are also described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9881"/>
          <seriesInfo name="DOI" value="10.17487/RFC9881"/>
        </reference>
        <reference anchor="RFC8391">
          <front>
            <title>XMSS: eXtended Merkle Signature Scheme</title>
            <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
            <author fullname="D. Butin" initials="D." surname="Butin"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
            <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8391"/>
          <seriesInfo name="DOI" value="10.17487/RFC8391"/>
        </reference>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="RFC9909">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Algorithm Identifiers for the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA)</title>
            <author fullname="K. Bashiri" initials="K." surname="Bashiri"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
            <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
            <author fullname="S. Kousidis" initials="S." surname="Kousidis"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>Digital signatures are used within the X.509 Public Key Infrastructure, such as X.509 certificates and Certificate Revocation Lists (CRLs), as well as to sign messages. This document specifies the conventions for using the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in the X.509 Public Key Infrastructure. The conventions for the associated signatures, subject public keys, and private keys are also specified.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9909"/>
          <seriesInfo name="DOI" value="10.17487/RFC9909"/>
        </reference>
      </references>
    </references>
    <?line 252?>

<section anchor="implementation-alternatives-for-ml-dsa">
      <name>Implementation Alternatives for ML-DSA</name>
      <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to provide the SignedOctets string to the cryptographic library to generate the full signature; this works for SLH-DSA as well.</t>
      <t>The second approach involves using the Externalμ-ML-DSA API allowed by <xref target="FIPS204"/>; specifically by the comment to line 6 of algorithm 7 of FIPS 204.
In this method, the implementation calls the External μ pre-hashing mode with the SignedOctets string and the ML-DSA public key, which externalizes the message pre-hashing originally performed inside the signing operation (see Appendix D of <xref target="RFC9881"/> for ML-DSA pre-hashing). The resulting μ value is then passed to the cryptographic library to execute the Externalμ-ML-DSA.Sign API, which uses μ and the ML-DSA private key to produce the signature. This document specifies only the use of ML-DSA's External μ mode and does not use HashML-DSA. This approach avoids requiring large message inputs to be processed within potentially constrained cryptographic modules, such as Hardware Security Modules (HSMs).</t>
      <t>Both approaches are considered "pure" mode and produce the same ML-DSA signature and are fully interoperable. The choice between them depends on implementation preferences, such as whether the External μ pre-hashing step is handled internally by the cryptographic module or performed explicitly by the IKEv2 implementation.</t>
    </section>
    <section anchor="ASN">
      <name>ASN.1 Objects</name>
      <t>This section lists AlgorithmIdentifier ASN.1 objects for algorithms mentioned in the document in binary form.<br/>
This section is not normative, and these values should only be used as
examples. If the ASN.1 object listed in this section and the ASN.1
object specified by the algorithm differ, then the algorithm
specification must be used.</t>
      <t>The generic format for the AlgorithmIdentifier ASN.1 object is defined in Section 4.1.1.2 of PKIX <xref target="RFC5280"/>.</t>
      <section anchor="ml-dsa-44">
        <name>ML-DSA-44</name>
        <t>id-ml-dsa-44 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-44(17) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-44, oid = 2.16.840.1.101.3.4.3.17
Length = 13
0000: 300b 0609 6086 4801 6503 0403 11
]]></artwork>
      </section>
      <section anchor="ml-dsa-65">
        <name>ML-DSA-65</name>
        <t>id-ml-dsa-65 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-65(18) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-65, oid = 2.16.840.1.101.3.4.3.18
Length = 13
0000: 300b 0609 6086 4801 6503 0403 12
]]></artwork>
      </section>
      <section anchor="ml-dsa-87">
        <name>ML-DSA-87</name>
        <t>id-ml-dsa-87 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-ml-dsa-87(19) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-ml-dsa-87, oid = 2.16.840.1.101.3.4.3.19
Length = 13
0000: 300b 0609 6086 4801 6503 0403 13
]]></artwork>
      </section>
      <section anchor="slh-dsa-128s-sha2">
        <name>SLH-DSA-128S-SHA2</name>
        <t>id-slh-dsa-sha2-128s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-128s(20) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-128s, oid = 2.16.840.1.101.3.4.3.20
Length = 13
0000: 300b 0609 6086 4801 6503 0403 14
]]></artwork>
      </section>
      <section anchor="slh-dsa-128f-sha2">
        <name>SLH-DSA-128F-SHA2</name>
        <t>id-slh-dsa-sha2-128f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-128f(21) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-128f, oid = 2.16.840.1.101.3.4.3.21
Length = 13
0000: 300b 0609 6086 4801 6503 0403 15
]]></artwork>
      </section>
      <section anchor="slh-dsa-192s-sha2">
        <name>SLH-DSA-192S-SHA2</name>
        <t>id-slh-dsa-sha2-192s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-192s(22) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-192s, oid = 2.16.840.1.101.3.4.3.22
Length = 13
0000: 300b 0609 6086 4801 6503 0403 16
]]></artwork>
      </section>
      <section anchor="slh-dsa-192f-sha2">
        <name>SLH-DSA-192F-SHA2</name>
        <t>id-slh-dsa-sha2-192f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-192f(23) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-192f, oid = 2.16.840.1.101.3.4.3.23
Length = 13
0000: 300b 0609 6086 4801 6503 0403 17
]]></artwork>
      </section>
      <section anchor="slh-dsa-256s-sha2">
        <name>SLH-DSA-256S-SHA2</name>
        <t>id-slh-dsa-sha2-256s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-256s(24) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-256s, oid = 2.16.840.1.101.3.4.3.24
Length = 13
0000: 300b 0609 6086 4801 6503 0403 18
]]></artwork>
      </section>
      <section anchor="slh-dsa-256f-sha2">
        <name>SLH-DSA-256F-SHA2</name>
        <t>id-slh-dsa-sha2-256f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-sha2-256f(25) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-sha2-256f, oid = 2.16.840.1.101.3.4.3.25
Length = 13
0000: 300b 0609 6086 4801 6503 0403 19
]]></artwork>
      </section>
      <section anchor="slh-dsa-128s-shake">
        <name>SLH-DSA-128S-SHAKE</name>
        <t>id-slh-dsa-shake-128s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-128s(26) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-128s, oid = 2.16.840.1.101.3.4.3.26
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1a
]]></artwork>
      </section>
      <section anchor="slh-dsa-128f-shake">
        <name>SLH-DSA-128F-SHAKE</name>
        <t>id-slh-dsa-shake-128f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-128f(27) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-128f, oid = 2.16.840.1.101.3.4.3.27
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1b
]]></artwork>
      </section>
      <section anchor="slh-dsa-192s-shake">
        <name>SLH-DSA-192S-SHAKE</name>
        <t>id-slh-dsa-shake-192s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-192s(28) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-192s, oid = 2.16.840.1.101.3.4.3.28
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1c
]]></artwork>
      </section>
      <section anchor="slh-dsa-192f-shake">
        <name>SLH-DSA-192F-SHAKE</name>
        <t>id-slh-dsa-shake-192f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-192f(29) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-192f, oid = 2.16.840.1.101.3.4.3.29
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1d
]]></artwork>
      </section>
      <section anchor="slh-dsa-256s-shake">
        <name>SLH-DSA-256S-SHAKE</name>
        <t>id-slh-dsa-shake-256s OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-256s(30) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-256s, oid = 2.16.840.1.101.3.4.3.30
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1e
]]></artwork>
      </section>
      <section anchor="slh-dsa-256f-shake">
        <name>SLH-DSA-256F-SHAKE</name>
        <t>id-slh-dsa-shake-256f OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) sigAlgs(3) id-slh-dsa-shake-256f(31) }</t>
        <t>Parameters are absent.</t>
        <artwork><![CDATA[
Name = id-slh-dsa-shake-256f, oid = 2.16.840.1.101.3.4.3.31
Length = 13
0000: 300b 0609 6086 4801 6503 0403 1f
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
