<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hale-mls-combiner-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="HPQMLS">Flexible Hybrid PQ MLS Combiner</title>
    <seriesInfo name="Internet-Draft" value="draft-hale-mls-combiner-01"/>
    <author initials="J." surname="Alwen" fullname="Joël Alwen">
      <organization>AWS</organization>
      <address>
        <email>alwenjo@amazon.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="M." surname="Mularczyk" fullname="Marta Mularczyk">
      <organization>AWS</organization>
      <address>
        <email>mulmarta@amazon.ch</email>
      </address>
    </author>
    <author initials="X." surname="Tian" fullname="Xisen Tian">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>xisen.tian1@nps.edu</email>
      </address>
    </author>
    <date year="2024" month="September" day="26"/>
    <area>Security</area>
    <workgroup>MLS</workgroup>
    <keyword>security</keyword>
    <keyword>authenticated key exchange</keyword>
    <keyword>PCS</keyword>
    <keyword>Post-Quantum</keyword>
    <abstract>
      <?line 51?>
<t>This document describes a protocol for combining a traditional MLS session with a post-quantum (PQ) MLS session to achieve flexible and efficient hybrid PQ security that amortizes the computational cost of PQ Key Encapsulation Mechanisms and Digital Signature Algorithms. Specifically, we describe how to use the exporter secret of a PQ MLS session, i.e. an MLS session using a PQ ciphersuite, to seed PQ guarantees into an MLS session using a traditional ciphersuite. By supporting on-demand traditional-only key updates (a.k.a. PARTIAL updates) or hybrid-PQ key updates (a.k.a. FULL updates), we can reduce the bandwidth and computational overhead associated with PQ operations while meeting the requirement of frequent key rotations.</t>
    </abstract>
  </front>
  <middle>
    <?line 53?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A fully capable quantum adversary has the ability to break fundamental underlying cryptographic assumptions of traditional Key Encapsulation Mechanisms (KEMs) and Digital Signature Algorithms (DSAs). This has led to the development of post-quantum (PQ) cryptographically secure KEMs and DSAs by the cryptographic research community which have been formally adopted by the National Institute of Standards and Technology (NIST), including the Module Lattice KEM (ML-KEM) and Module Lattice DSA (ML-DSA) algorithms. While these provide PQ security, ML-KEM and ML-DSA have significantly worse overhead in terms of public key size, signature size, ciphertext size, and CPU time than their traditional counterparts. Moreover, research arms on side-channel attacks, etc., have motivated uses of hybrid-PQ combiners that draw security from both the underlying PQ and underlying traditional components. A variety of hybrid security treatments have arisen across IETF working groups to bridge the gap between performance and security to encourage the adoption of PQ security in existing protocols, including the MLS protocol [RFC9420].</t>
      <t>Within the MLS working group, there are several topic areas that make use of PQ security extensions:</t>
      <ol spacing="normal" type="1"><li>
          <t>A single MLS ciphersuite for a hybrid post-quantum/traditional KEM.  The ciphersuite can act as a drop-in replacement for the KEM, focusing on hybrid confidentiality but not authenticity, and does not incur changes elsewhere in the MLS stack. As a confidentiality focus, it addresses the the harvest-now / decrypt-later threat model. However, every key epoch incurs a PQ overhead cost.</t>
        </li>
        <li>
          <t>Hybrid PQ signature ciphersuites that address hybrid authenticity, including construction and security considerations of hybrid signatures.</t>
        </li>
        <li>
          <t>Mechanisms that leverage hybridization as a means to not only address the security balance between PQ and traditional components and achieve resistance to harvest-now / decrypt-later attacks, but also use it as a means to improve performance of PQ use.</t>
        </li>
      </ol>
      <t>This document addresses the third topic of these work items.</t>
    </section>
    <section anchor="about-this-document">
      <name>About This Document</name>
      <t>This note is to be removed before publishing as an RFC.</t>
      <t>Status information for this document may be found at <em>[Todo]</em>.</t>
      <t>Discussion of this document takes place on the MLS Working Group mailing list (mailto:mls@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/mls/.  Subscribe at https://www.ietf.org/mailman/listinfo/mls/.</t>
      <t>Source for this draft and an issue tracker can be found at https://github.com/PairedMLS/draft-pairedMLS.</t>
    </section>
    <section anchor="status-of-this-memo">
      <name>Status of this Memo</name>
      <t>This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.</t>
      <t>Internet-Drafts are working documents of the Internet Engineering Task Force (IETF).  Note that other groups may also distribute  working documents as Internet-Drafts.  The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.</t>
      <t>Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time.  It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."</t>
    </section>
    <section anchor="copyright-notice">
      <name>Copyright Notice</name>
      <t>Copyright (c) 2024 IETF Trust and the persons identified as the document authors.  All rights reserved.</t>
      <t>This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.  Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14, [RFC2119], and [RFC8174] when, and only when, they appear in all capitals, as shown here.</t>
      <t>The terms MLS client, MLS member, MLS group, Leaf Node, GroupContext, KeyPackage, Signature Key, Handshake Message, Private Message, Public Message, and RequiredCapabilities have the same meanings as in the [MLS protocol] <eref target="https://www.rfc-editor.org/rfc/rfc9420.html">https://www.rfc-editor.org/rfc/rfc9420.html</eref>.</t>
    </section>
    <section anchor="notation">
      <name>Notation</name>
      <t>We use terms from from MLS [RFC9420] and PQ Hybrid Terminology [I-D.ietf-pquip-pqt-hybrid-terminology]. Below, we have restated relevant terms and define new ones:</t>
      <t><strong>Application Message:</strong> A PrivateMessage carrying application data.</t>
      <t><strong>Handshake Message:</strong> A PublicMessage or PrivateMessage carrying an MLS Proposal or Commit object, as opposed to application data.</t>
      <t><strong>Key Derivation Function (KDF):</strong> A Hashed Message Authentication Code (HMAC)-based expand-and-extract key derivation function (HKDF) as described in RFC5869.</t>
      <t><strong>Key Encapsulation Mechanism (KEM):</strong>  A key transport protocol that allows two parties to obtain a shared secret based on the receiver's public key.</t>
      <t><strong>Post-Quantum (PQ) MLS Session:</strong> An MLS session that uses a PQ-KEM construction, such as described by FIPS 203 from NIST. It may optionally also use a PQ-DSA construction, such as described by FIPS 204 from NIST.</t>
      <t><strong>Traditional MLS Session:</strong> An MLS session that uses a Diffie-Hellman (DH) based KEM as described in RFC9180.</t>
      <t><strong>PQ/T</strong>: A Post-Quantum and Traditional hybrid (protocol).</t>
    </section>
    <section anchor="the-combiner-protocol-execution">
      <name>The Combiner Protocol Execution</name>
      <t>The hybrid PQ MLS (HPQMLS) combiner protocol runs two MLS sessions in parallel, synchronizing their group memberships. The two sessions are combined by exporting a secret from the PQ session and importing it as a Pre-Shared Key (PSK) into the traditional session. This combination process is mandatory for Commits of Add and Remove proposals in order to maintain synchronization between the sessions. However, it is optional for any other Commits (e.g. to allow for less computationally expensive traditional key rotations). Due to the higher computational costs and output sizes of PQ KEM (and signature) operations, it may be desirable to issue PQ combined (a.k.a. FULL) Commits less frequently than the traditional-only (a.k.a. PARTIAL) Commits. Since FULL Commits introduce PQ security into the MLS key schedule, the overall key schedule remains PQ-secure even when PARTIAL Commits are used. The FULL Commit rate establishes the post-quantum Post-Compromise Security (PCS) window, while the PARTIAL Commit rate can tighten the traditional PCS window even while maintaining PQ security more generally. The combiner protocol design treats both sessions as black-box interfaces so we only highlight operations requiring synchronizations in this document.</t>
      <t>The default way to start a HPQMLS combined session is to create a PQ MLS session and then start a traditional MLS session with the exported PSK from the PQ session, as previously mentioned. Alternatively, a combined session can also be created after a traditional MLS session has already been running. This is done through creating a PQ MLS session with the same group members, sending a Welcome message containing the HPQMLSInfo struct in the GroupContext, and then making a FULL Commit as described in in the <xref target="commit-flow">Commit Flow</xref> section.</t>
      <section anchor="commit-flow">
        <name>Commit Flow</name>
        <t>Commits to proposals MAY be <em>PARTIAL</em> or <em>FULL</em>. For a PARTIAL Commit, only the traditional session's epoch is updated following the Propose-Commit sequence from Section 12 of RFC9420. For a FULL Commit, a Commit is first applied to the PQ session and another Commit is applied to the traditional session using a PSK derived from the PQ session using the DeriveExtensionSecret and <tt>hpqmls_psk</tt> label (see <xref target="key-schedule">Key Schedule</xref>). To ensure the correct PSK is imported into the traditional session, the sender includes information about the PSK in a PreSharedKey proposal for the traditional session's Commit list of proposals. The information about the exported PSK is captured (shown '=' in the figures below for illustration purposes) by the PreSharedKeyID struct as detailed in <eref target="https://www.rfc-editor.org/rfc/rfc9420.html#name-pre-shared-keys">RFC9420</eref>. Receivers process the PQ Commit to derive a new epoch in the PQ session and then the traditional Commit (which also includes the PSK proposal) to derive the new epoch in the traditional session.</t>
        <artwork><![CDATA[
                                                                    Group
  A                                      B                         Channel
|                                        |                            |
| Commit'()                              |                            |
|    PresharedKeyID =                    |                            |
|    DeriveExtensionSecret('hpqmls_psk') |                            |
| Commit(PreSharedKeyID)                 |                            |
|-------------------------------------------------------------------->|
|                                        |                            |
|                                        |                 Commit'()  |
|                                        |    Commit(PreSharedKeyID)  |
|<--------------------------------------------------------------------+
|                                        |<---------------------------+
Fig 1a. FULL Commit to an empty proposal list.
    Messages with ' are sent in the the PQ session. 
    PreSharedKeyID identifies a PSK exported from the PQ
    session in the new epoch following a Commit'(). The 
    PreSharedKeyID  is implicitly included in the commit 
    in the classical session via the PreSharedKey Proposal. 

                                                                        Group
  A                                      B                             Channel
|                                        |                                |
|                                        | Upd'(B)                        |
|                                        | Upd(B, f)                      |
|                                        |------------------------------->|
|                                        |                                |
|                                        |                        Upd'(B) |
|                                        |                      Upd(B, f) |
|<------------------------------------------------------------------------+
|                                        |<-------------------------------+
|                                        |                                |
| Commit'(Upd')                          |                                |
|    PresharedKeyID =                    |                                |
|    DeriveExtensionSecret('hpqmls_psk') |                                |
| Commit(Upd, PreSharedKeyID)            |                                |
|------------------------------------------------------------------------>|
|                                        |                                |
|                                        |                  Commit'(Upd') |
|                                        |    Commit(Upd, PreSharedKeyID) |
|<------------------------------------------------------------------------+
|                                        |<-------------------------------+
Fig 1b. FULL Commit to an Update proposal from Client B. 
    Messages with ' are sent in the the PQ session.
]]></artwork>
        <t><strong>Remark</strong>: Fig 1b shows Client A accepting the update proposals from Client B as a FULL Commit. The flag <tt>f</tt> in the classical update proposal <tt>Upd(B, f)</tt> indicates B's intention for a FULL Commit to whomever Commits to its proposal.</t>
      </section>
      <section anchor="adding-a-user">
        <name>Adding a User</name>
        <t>User leaf nodes are first added to the PQ session following the sequence described in Section 3 of RFC9420 except using PQ algorithms where HPKE algorithms exist. For example, a PQ-DSA signed PQ KeyPackage, i.e. containing a PQ public key, must first be published via the Distribution Service (DS). Then the associated Commit and Welcome messages will be sent and processed in the PQ session according to Section 12 of RFC9420. The same sequence is repeated in the standard session except following the FULL Commit combining sequence where a PreSharedKeyID proposal is additionally committed. The joiner MUST issue a FULL Commit as soon as possible after joining to achieve PCS.</t>
        <artwork><![CDATA[
                                                     Key Package                                    Group
A                                          B          Directory                                    Channel
|                                          |              |                                           |
|                                          | KeyPackageB' |                                           |
|                                          |  KeyPackageB |                                           |
|<--------------------------------------------------------+                                           |
|                                          |              |                                           |
| Commit'(Add'(KeyPackageB'))              |              |                                           |
|   PresharedKeyID =                       |              |                                           |
|   DeriveExtensionSecret('hpqmls_psk')    |              |                                           |
| Commit(Add(KeyPackageB), PreSharedKeyID) |              |                                           |
+---------------------------------------------------------------------------------------------------->|
|                                          |              |                                           |
| Welcome'                                 |              |                                           | 
| Welcome(PreSharedKeyID)                  |              |                                           | 
+----------------------------------------->|              |                                           |
|                                          |              |                                           |
|                                          |              |  Commit'(Add'(KeyPackageB'))              |
|                                          |              |  Commit(Add(KeyPackageB), PreSharedKeyID) |
|<----------------------------------------------------------------------------------------------------+

  Figure 2: 
  Client A adds client B to the group.
  Messages with ' come from the PQ session. Processing Welcome and Commit in the traditional
  sessio requires the PSK exported exported from the PQ session.
]]></artwork>
        <section anchor="welcome-message-validation">
          <name>Welcome Message Validation</name>
          <t>Since a client must join two sessions, the Welcome messages it receives to each session must indicate that it is not sufficient to join only one or the other. Therefore, the HPQMLSInfo struct indicating the GroupID and ciphersuites of the two sessions MUST be included in the Welcome message via serialization as a GroupContext Extension in order to validate joining the combined sessions. All members MUST verify group membership is consistent in both sessions after a join and the new member MUST issue a FULL Commit as described in Fig 1b.</t>
        </section>
        <section anchor="external-joins">
          <name>External Joins</name>
          <t>External joins are used by members who join a group without being explicitly added (via an Add-Commit sequence) by another existing member. The external user MUST join both the PQ session and the traditional session. As stated previously, the GroupInfo used to create the External Commit MUST contain the HPQMLSInfo struct. After joining, the new member MUST issue a FULL Commit as described in Fig 1b.</t>
        </section>
      </section>
      <section anchor="removing-a-group-member">
        <name>Removing a Group Member</name>
        <t>User removals MUST be done in both PQ and traditional sessions followed by a FULL Commit Update as as described in Fig 1b. Members MUST verify group membership is consistent in both sessions after a removal.</t>
      </section>
      <section anchor="application-messages">
        <name>Application Messages</name>
        <t>HPQMLS combiner provides PQ security to the traditional MLS session. Application messages are therefore only sent in the traditional session using the <tt>encryption_secret</tt> provided by the key schedule of the traditional session according to Section 15 of RFC9420.</t>
      </section>
    </section>
    <section anchor="modes-of-operation">
      <name>Modes of Operation</name>
      <t>Security needs vary by organizations and system-specific risk tolerance and/or constraints. While this combiner protocol targets combining a PQ session and a traditional session the degree of PQ security may be tuned depending on the use-case: i.e., as PQ/T Confidentiality Only or both PQ/T Confidentiality and PQ/T Authenticity. For PQ/T Confidentiality Only, the PQ session MUST use a PQ KEM, while for PQ authenticity, the PQ session MUST use both a PQ KEM and a PQ DSA. 
The modes of operation are specified by the <tt>mode</tt> flag in HPQMLSInfo struct and are listed below.</t>
      <section anchor="pqt-confidentiality-only">
        <name>PQ/T Confidentiality Only</name>
        <t>The default mode of operation is PQ/T Confidentiality Only mode. This mode provides confidentiality and limited authenticity against quantum attackers. More precisely, it provides PQ authenticity against "outsiders", that is, against quantum attackers who do not have acces to (signature) secret keys of any group member. (Authenticity comes from the fact that the traditional session adds AEAD / MAC tags which are not available to outsiders with CRQC.) This mode does not prevent quantum impersonation attacks by other group members. That is, a group member with a CRQC can successfully impersonate another group member.</t>
      </section>
      <section anchor="pqt-confidentiality-authenticity">
        <name>PQ/T Confidentiality + Authenticity</name>
        <t>The elevated mode of operation is the PQ/T Confidentiality + Authenticity mode. Under a use environment of a cryptographically relevant quantum computer (CRQC), the threat model used in the default mode would be too weak and assurance about update authenticity is required. Recall that authenticity in MLS refers to three types of guarantees: 1) that messages were sent by a member of the group provided by the computed symmetric group key used in AEAD, 2) that key updates were performed by a valid member of the group, and 3) that a message was sent by a particular user (i.e. non-repudiation) provided by digital signatures on messages. While the symmetric group key used for AEAD in the traditional session remains protected from a CRQC adversary through the PSK from the PQ session, signatures would not be secure against forgery without using a PQ DSA to sign handshake messages nor are application messages assured to have non-repudiation against a CRQC adversary. Therefore, in the PQ/T Confidentiality + Authenticity mode, the PQ session MUST use a PQ DSA in addition to PQ KEM ciphersuites for handshake messages (the traditional session remains unchanged).</t>
        <t>This version of PQ authenticity provides PQ authenticity to the PQ session's MLS commit messages, strengthening assurance for (1) and ensuring (2). These in turn provide PQ assurance for the key schedule from which application keys are derived in the traditional session. Application keys are used in an AEAD for protection of MLS application messages and thereby inherit the PQ security. However, it should be noted that PQ non-repudation security for application messages as described by (3) is not achieved by this mode. Achieving PQ non-repudiation on application messages would require hybrid signatures in the traditional session, with considerations to options described in [I-D.hale-pquip-hybrid-signature-spectrums].</t>
      </section>
    </section>
    <section anchor="extension-requirements-to-mls">
      <name>Extension Requirements to MLS</name>
      <t>The HPQMLSInfo struct contains characterizing information to signal to users that they are participating in a hybrid session. This is necessary both functionally to allow for group synchronization and as a security measure to prevent downgrading attacks to coax users into parcipating in just one of the two sessions. The <tt>group_id</tt>, <tt>cipher_suite</tt>, and <tt>epoch</tt> from both sessions (<tt>t</tt> for the traditional session and <tt>pq</tt> for the PQ session) are used as bookkeeping values to validate and synchronize group operations. The <tt>mode</tt> is a boolean value: <tt>0</tt> for the default PQ/T Confidentiality Only mode and <tt>1</tt> for the PQ/T Confidentiality + Authenticity mode.</t>
      <t>The HPQMLSInfo struct conforms to the Safe Extensions API (see [I-D.ietf-mls-extensions]). Recall that an extension is called <em>safe</em> if it does not modify base MLS protocol or other MLS extensions beyond using components of the Safe Extension API. This allows security analysis of our HPQMLS Combiner protocol in isolation of the security guarantees of the base MLS protocol to enable composability of guarantees. The HPMLSInfo extension struct SHALL be in the following format:</t>
      <artwork><![CDATA[
  struct{
      ExtensionType HPQMLS;
      opaque extension_data<V>; 
      } ExtensionContent; 

  struct{
      opaque t_session_group_id<V>; 
      opaque PQ_session_group_id<V>; 
      bool mode; 
      CipherSuite t_cipher_suite; 
      CipherSuite pq_cipher_suite; 
      uint64 t_epoch; 
      uint64 pq_epoch;
  } HPQMLSInfo
]]></artwork>
      <section anchor="key-schedule">
        <name>Key Schedule</name>
        <t>The <tt>hpqmls_psk</tt> exporter key derived in the PQ session MUST be derived in accordance with the Safe Extensions API guidance (see 2.1.5 Exporting Secrets in [I-D.ietf-mls-extensions]). In particular, it SHALL NOT use the <tt>extension_secret</tt> and MUST be derived from only the <tt>epoch_secret</tt> from the key schedule in <eref target="https://www.rfc-editor.org/rfc/rfc9420.html">[RFC9420]</eref>. This is to ensure forward secrecy guarantees (see <xref target="security-considerations">Security Considerations</xref>).</t>
        <t>Even though the <tt>hpqmls_psk</tt> PSK is not sent over the wire, members of the HPQMLS session must agree on the value of which PSK to use. In alignment with the Safe Extensions API policy for PSKs, HPQMLS PSKs used SHALL set <tt>PSKType = 3</tt> and <tt>extension_type = HPQMLS</tt> (see Section 2.1.6 Pre-Shared Keys in [I-D.ietf-mls-extensions]).</t>
        <artwork><![CDATA[
  PQ Session                       Traditional Session
  ----------                       -------------------  

    [...] 
DeriveExtensionSecret(epoch_secret, 
      |            "hpqmls_export")    
      | = hpqmls_psk                      [...]
      |                               joiner_secret
      |                                     |
      |                                     |
      |                                     V
      +----------> <psk_secret (or 0)> --> KDF.Extract
    [...]                                   |
                                            |
                                            +--> DeriveSecret(., "welcome")
                                            |    = welcome_secret
                                            |
                                            V
                                    ExpandWithLabel(., "epoch", GroupContext_[n], KDF.Nh)
                                            |
                                            |
                                            V
                                      epoch_secret
                                            |
                                            |
                                            +--> DeriveSecret(., <label>)
                                            |    = <secret>
                                          [...]
Fig 3: The hpqmls_psk of the PQ session is injected into the key schedule of the 
traditional session using the safe extensions API DeriveExtensionSecret. 
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="full-commit-frequency">
        <name>FULL Commit Frequency</name>
        <t>So long as the FULL Commit flow is followed for group administration actions, PQ security is extended to the traditional session. Therefore, FULL Commits can occur as frequently or infrequently as desired by any given security policy. This results in a flexible and efficient use of compute, storage, and bandwidth resources for the host by mainly calling partial updates on the traditional MLS session, given that the group membership is stable. Thus, our protocol provides PQ security and can maintain a tighter PCS window against traditional attackers as well as forward secrecy window against traditional or quantum attackers with lower overhead when compared to running a single MLS session that only uses PQ KEMs or PQ KEM/DSAs. Furthermore, the PQ PCS window against quantum attackers can be selected based on an application and even variable over time, ranging from e.g. a single FULL Commit in PQ/T Confidentiality Only mode followed by PARTIAL Commits from that point onwards (enabling general PQ/traditional confidentiality, traditional update authenticity, traditional PCS, and PQ/traditional forward secrecy) to frequent FULL Commits in the same mode (enabling general PQ/traditional confidentiality, traditional update authenticity, PQ/traditional PCS, and PQ/traditional forward secrecy). In PQ/T Confidentiality + Authenticity mode with frequent FULL Commits, the latter case would enable general PQ/traditional confidentiality, PQ/traditional update authenticity, PQ/traditional PCS, and PQ/traditional forward secrecy.</t>
      </section>
      <section anchor="attacks-on-authentication">
        <name>Attacks on Authentication</name>
        <t>While PQ message integrity is provided by the symmetric key used in AEAD, attacks on non-repudiation (e.g., source forgery) on application messages may still be possible by a CRQC adversary since only traditional signatures on used after the AEAD. However, in terms of group key agreement, this is insufficient to mount anything more than a denial-of-service attack (e.g. via group state desynchronization). In terms of application messages, a traditional DSA signature may be forged by an external CRQC adversary, but the content (including sender information) is still protected by AEAD which uses the symmetric group key. Thus, an external CRQC adversary can only conduct a false-framing attack, where group members are assured of the authenticity of a message being sent by a group member for the adversary has changed the signature to imply a different sender; it would require an insider CRQC adversary to actually mount a masquerading or forgery attack, which is beyond the scope of this protocol.</t>
        <t>If this is a concern, Hybrid PQ DSAs can be used in the traditional session to sign application messages. Since this would negate much of the efficiency gains from using this protocol and denial-of-service attacks can be achieve through more expeditious means, such a option is not considered here.</t>
      </section>
      <section anchor="forward-secrecy">
        <name>Forward Secrecy</name>
        <t>Recall that one of the ways MLS achieves forward secrecy is by deleting security sensitive values after they are consumed (e.g. to encrypt or derive other keys/nonces) and the key schedule has entered a new epoch. For example, values such as the <tt>init_secret</tt> or <tt>epoch_secret</tt> are deleted at the <em>start</em> of a new epoch. If the MLS <tt>exporter_secret</tt> or the <tt>extension_secret</tt> from the PQ session is used directly as a PSK for the traditional session, against the requirements set above, then there is a potential scenario in which an adversary can break forward secrecy because these keys are derived <em>during</em> an epoch and are not deleted. Therefore, the <tt>hpqmls_psk</tt> MUST be derived from the <tt>epoch_secret</tt> of the PQ session (see Figure 3) to ensure forward secrecy.</t>
      </section>
      <section anchor="transport-security">
        <name>Transport Security</name>
        <t>Recommendations for preventing denial-of-service attacks or restricting transmitted messages are inherited from MLS.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>The MLS sessions combined by this protocol conform to the IANA registries listed for MLS RFC9420.</t>
    </section>
    <section anchor="references">
      <name>References</name>
      <section anchor="normative-references-ie-rfcs">
        <name>Normative References (i.e. RFCs)</name>
        <t>[I-D.ietf-mls-extensions] Robert, R., "The Messaging Layer Security (MLS) Extensions", Work in Progress, Internet-Draft, draft-ietf-mls-extensions-04, 24 April 2024,  <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-mls-extensions-04">https://datatracker.ietf.org/doc/html/draft-ietf-mls-extensions-04</eref></t>
        <t>[RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <eref target="https://www.rfc-editor.org/rfc/rfc2119">https://www.rfc-editor.org/rfc/rfc2119</eref>.</t>
        <t>[RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <eref target="https://www.rfc-editor.org/rfc/rfc8174">https://www.rfc-editor.org/rfc/rfc8174</eref>.</t>
        <t>[RFC9420] Barnes, R., Beurdouche, B., Robert, R., Millican, J., Omara, E., and K. Cohn-Gordon, "The Messaging Layer Security (MLS) Protocol", RFC 9420, DOI 10.17487/RFC9420, July 2023 <eref target="https://www.rfc-editor.org/rfc/rfc9420">https://www.rfc-editor.org/rfc/rfc9420</eref>.</t>
        <t>[I-D.hale-pquip-hybrid-signature-spectrums] Bindel, N., Hale, B., Connolly, D., and F. D, "Hybrid signature spectrums", Work in Progress, Internet-Draft, draft-hale-pquip-hybrid-signature-spectrums-01, 6 November 2023, <eref target="https://datatracker.ietf.org/doc/html/draft-hale-pquip-hybrid-signature-spectrums-01">https://datatracker.ietf.org/doc/html/draft-hale-pquip-hybrid-signature-spectrums-01</eref>.</t>
        <t>[I-D.ietf-pquip-pqt-hybrid-terminology] Driscoll, F., Parsons, M., and Hale, B., "Terminology for Post-Quantum Traditional Hybrid Schemes", Work in Progress, Internet-Draft, draft-ietf-pquip-pqt-hybrid-terminology-04, 18 September 2024, <eref target="https://datatracker.ietf.org/doc/draft-ietf-pquip-pqt-hybrid-terminology/">https://datatracker.ietf.org/doc/draft-ietf-pquip-pqt-hybrid-terminology/</eref>.</t>
      </section>
      <section anchor="informational-references">
        <name>Informational References</name>
        <t>TODO</t>
        <!--# Appendices -->

</section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <!-- {:numbered="false"} -->
<t>## Contributors</t>
      <section anchor="authors">
        <name>Authors</name>
      </section>
    </section>
  </middle>
  <back>








  </back>
  <!-- ##markdown-source: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-->

</rfc>
