<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hale-pquip-hybrid-signature-spectrums-04" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="hale-pquip-hybrid-spectrums">Hybrid signature spectrums</title>
    <seriesInfo name="Internet-Draft" value="draft-hale-pquip-hybrid-signature-spectrums-04"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>deirdre.connolly@sandboxaq.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2024" month="March" day="21"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatiblity, hybrid generality,
and simultaneous verification.</t>
      <t>Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains the
draft:
https://github.com/dconnolly/draft-hale-pquip-hybrid-signature-spectrums</t>
    </abstract>
  </front>
  <middle>
    <?line 138?>

<!--

# Todos

- add discussion
- extend with discussion points from private emails between Britta, Nina and IETF
- revise re Brendan's email
  - change terminology 'proof composability'?
  - change terminology 'next-gen' vs 'post-quantum'?
- change terminology using 'black-box'?


-->

<section anchor="introduction">
      <name>Introduction</name>
      <t>Initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential risk
of store and decrypt attacks, where data encrypted today using
traditional algorithms could be decrypted in the future by an attacker
with a Cryptographically-Relevant Quantum Computer (CRQC). While
traditional authentication is only at risk once a CRQC exists, it is
important to consider the transition to post-quantum authentication
before this point.  This is particularly relevant for systems where
algorithm turn-over is complex or takes a long time (e.g., long-lived
systems with hardware roots of trust), or where future checks on past
authenticity play a role (e.g., digital signatures on legal documents).</t>
      <t>The relative newness of many (although not all) post-quantum algorithms
means that less cryptanalysis of such algorithms is available than
for long-established counterparts, such as RSA and elliptic-curve based
solutions for confidentiality and authenticity. This has drawn attention
to hybrid cryptographic schemes, which combine both traditional
and post-quantum (or more generally next-generation) algorithms in one
cryptographic scheme. These may offer increased assurance for implementers,
namely that as long as the security of one of the two component algorithms of
the hybrid scheme holds, the confidentiality or authenticity offered by
that scheme is maintained.</t>
      <t>Whether or not hybridization is desired depends on the use case
and security threat model. Conservative users may not have complete trust
in the post-quantum algorithms or implementations available,
while also recognizing a need to start post-quantum transition. For such
users, hybridization can support near-term transition while also avoiding
trusting solo post-quantum algorithms too early. On the other hand, hybrid
schemes, particularly for authentication, may introduce significant complexity
into a system or a migration process, so might not be the right choice for all.
For cases where hybridization is determined to be advantageous, a decision on
how to hybridize needs to be made. With many options available, this document
is intended to provide context on some of the trade-offs and nuances to consider.</t>
      <t>Hybridization has been looked at for key encapsulation <xref target="HYBRIDKEM"/>, and
in an initial sense for digital signatures <xref target="HYBRIDSIG"/>. Compared to key
encapsulation, hybridization of digital signatures, where the verification
tag may be expected to attest to both standard and post-quantum components,
is subtler to design and implement due to the potential separability of
the hybrid/dual signatures and the risk of downgrade/stripping attacks.
There are also a range of requirements and properties that may be required
from hybrid signatures, not all of which can be achieved at once.</t>
      <t>This document focuses on explaining advantages and disadvantages of
different hybrid signature scheme designs and different security goals
for them. It is intended as a resource for designers and implementers of
hybrid signature schemes to help them decide what properties they do and
do not require from their scheme. It does not attempt to answer the
question of whether or not a hybrid scheme is desirable for, or should be
used in a given case. It also intentionally does not propose concrete hybrid
signature combiners or instantiations thereof.</t>
      <section anchor="revision-history">
        <name>Revision history</name>
        <ul empty="true">
          <li>
            <t><strong>RFC Editor's Note:</strong> Please remove this section prior to publication of a
final version of this document.</t>
          </li>
        </ul>
        <ul spacing="normal">
          <li>
            <t>01: Significant fleshing out after feedback from IETF 118.</t>
          </li>
          <li>
            <t>00: Initial version.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>We follow existing Internet drafts on hybrid terminology
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> and hybrid key encapsulation
mechanisms (KEM) <xref target="I-D.ietf-tls-hybrid-design"/> to enable settling on a
consistent language. We will make clear when this is not possible. In
particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined
in <xref target="RFC4949"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Signature scheme: A signature scheme is defined via the following
three algorithms:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>KeyGen() -&gt; (pk, sk)</tt>: A probabilistic key generation algorithm,
which generates a public verifying key <tt>pk</tt> and a secret signing key
<tt>sk</tt>.</t>
              </li>
              <li>
                <t><tt>Sign(sk, m) -&gt; (sig)</tt>: A probabilistic signature generation, which
takes as input a secret signing key <tt>sk</tt> and a message <tt>m</tt>, and
outputs a signature <tt>sig</tt>.</t>
              </li>
              <li>
                <t><tt>Verify(pk, sig, m) -&gt; b</tt>: A verification algorithm, which takes as
input a public verifying key <tt>pk</tt>, a signature <tt>sig</tt> and a message
<tt>m</tt>, and outputs a bit <tt>b</tt> indicating <tt>accept (b=1)</tt> or <tt>reject
(b=0)</tt> of the signature for message <tt>m</tt>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Hybrid signature scheme: Following
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we define a hybrid signature
scheme to be "a multi-algorithm digital signature scheme made up of
two or more component digital signature algorithms ...". While it
often makes sense for security purposes to require that the security
of the component schemes is based on the hardness of different
cryptographic assumptions, in other cases hybrid schemes might be
motivated, e.g., by interoperatbility of variants on the same scheme
and as such both component schemes are based on the same hardness
assumption (e.g., both post-quantum assumptions or even both the same
concrete assumption such as Ring LWE).  We allow this explicitly. This
means in particular that in contrast to
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, we will use the more general
term 'hybrid signature scheme' instead of requiring one post-quantum
and one traditional algorithm (i.e., PQ/T hybrid signature schemes) to
allow also the combination of several post-quantum algorithms. The
term 'composite scheme' is sometimes used as a synonym for 'hybrid
scheme'. This is different from
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/> where the term is used as a
specific instantiation of hybrid schemes such that "where multiple
cryptographic algorithms are combined to form a single key or
signature such that they can be treated as a single atomic object at
the protocol level." To avoid confusing we will avoid the term
'composite scheme'.</t>
          </li>
          <li>
            <t>Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'.  For example, NIST define a dual signature as "two
or more signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
reason as above we will avoid using the term 'composite signature'
although it sometimes appears as synonym for 'hybrid/dual signature'.</t>
          </li>
          <li>
            <t>Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.  'Ingredient (signature)
scheme' may be used as a synonym.</t>
          </li>
          <li>
            <t>Next-generation algorithms: Following <xref target="I-D.ietf-tls-hybrid-design"/>, we
define next-generation algorithms to be "algorithms which are not yet
widely deployed but which may eventually be widely deployed". Hybrid
signatures are mostly motivated by preparation for post-quantum
migration, hence the reference to post-quantum algorithms through this
draft.  However, the majority of the discussion in this document applies
equally well to future migration to other next-generation algorithms.</t>
          </li>
          <li>
            <t>Artifact: An artifact is evidence of the sender's intent to hybridize
a signature that remains even if a component algorithm tag is
removed. Artifacts can be e.g., at the algorithmic level (e.g., within
the digital signature), or at the protocol level (e.g., within the
certificate), or on the system policy level (e.g., within the
message). Artifacts should be easily identifiable by the receiver in
the case of signature stripping.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation">
        <name>Motivation for use of hybrid signature schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at why hybrid digital signatures are desirable for
some applications. As many of the arguments hold in general for hybrid
algorithms, we again refer to <xref target="I-D.ietf-tls-hybrid-design"/> that
summarizes these well.  In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name><strong>Complexity</strong></name>
          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme, it
also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the
next-generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative adopters
and therefore might hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks. Thus, even in a relatively simple
algorithm subtleties and caveats on implementation and use can arise
over time. Given the complexity of next generation algorithms, the
chance of such discoveries and caveats needs to be taken into account.</t>
          <t>Of note, some next generation algorithms have received substantial analysis
attention, for example through the NIST Post-Quantum Process <xref target="NIST_PQC_FAQ"/>.
Thus, if and when further information on caveats and implementation issues
come to light, it is less likely that a "break" will be catastrophic.
Instead, such vulnerabilities and issues may represent a weakening of
security - which may in turn be offset if a hybrid approach
has been used. The complexity of post-quantum algorithms needs to be
balanced against the fact that hybridization itself adds more complexity
to a protocol and introduces the risk of implementation mistakes in the
hybridization process.</t>
          <t>One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also relies
on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate schemes
Rainbow and GeMSS might call into question the asymptotic and concrete
security for conservative adopters and therefore might hinder adoption.</t>
        </section>
        <section anchor="time">
          <name><strong>Time</strong></name>
          <t>The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization.  Mosca’s equation <xref target="MOSCA"/> very simply illustrates the
risk of post-quantum transition delay: <tt>l + d &gt; q</tt>, where l is the
information life-span, d is the time for system transition to
post-quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. As opposed to key exchange and KEMs, it
may not be obvious why there is urgency for an adoption of post-quantum
signatures; namely, while encryption is subject to
store-now-decrypt-later attacks, there may not seem to be a parallel
notion for authenticity, i.e., 'store-now-modify-later attacks'.</t>
          <t>However, in larger systems, including national systems, space systems,
large healthcare support systems, and critical infrastructure, where
acquisition and procurement time can be measured in years and algorithm
replacement may be difficult or even practically impossible, this
equation can have drastic implications.  In such systems, algorithm
turn-over can be complex and difficult and can take considerable time
(such as in long-lived systems with hardware deployment), meaning that
an algorithm may be committed to long-term, with no option for
replacement. Long-term committment creates further urgency for immediate
post-quantum algorithm selection.  Additionally, for some sectors future
checks on past authenticity plays a role (e.g., many legal, financial,
auditing, and governmental systems).  The 'store-now-modify-later'
analogy would present challenges in such sectors, where future analysis
of past authentication may be more critical than in e.g., internet
connection use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals, while
also noting where security goals are in conflict, i.e., that achievement
of one goal precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name><strong>Hybrid Authentication</strong></name>
          <t>One goal of hybrid signature schemes is security. As defined in
<xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>, ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptograpthic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm remains
'secure'. There might be, however, other goals in competition with this
one, such as backward-compatibility. Hybrid authentication is an umbrella
term that encompassess more specific concepts of hybrid signature
security, such as 'hybrid unforgability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name><strong>Hybrid Unforgeability</strong></name>
            <t>Hybrid unforgeability is a specific type of hybrid authentication, where
the security assumption for the scheme, e.g. EUF-CMA or SUF-CMA, is
maintained as long as at least one of the component schemes is EUF-CMA
(resp., SUF-CMA) secure without a prioritisation. We call this notion
'hybrid unforgeability'; it is a specific type of hybrid
authentication. For example, the concatenation combiner in <xref target="HYBRIDSIG"/>
is 'hybrid unforgeable'. As mentioned above, this might be incompatible
with backward-compatibility, where the EUF-CMA (resp., SUF-CMA) security
of the hybrid signature relies solely on the security of one of the
component schemes instead of relying on both, e.g., the dual message
combiner using nesting in <xref target="HYBRIDSIG"/>. For more details, we refer to our
discussion below.</t>
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security
assumed for only one component scheme generally use hybrid techniques
for their functional transition pathway support, while fully trusting
either the traditional or post-quantum algorithm. In contrast, use cases
where a hybrid scheme is used with e.g., EUF-CMA security assumed for
both component schemes without prioritisation can use hybrid techniques
for both functional transition and security transition, where it may not
be known which algorithm should be relied upon.</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name><strong>Proof Composability</strong></name>
          <t>Under proof composability, the component algorithms are combined in such
a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc.  Otherwise an entirely
new proof of security is required, and there is a lack of assurance that
the combination builds on the standardization processes and analysis
performed to date on component algorithms. The resulting hybrid
signature would be, in effect, an entirely new algorithm of its own. The
more the component signature schemes are entangled, the more likely it
is that an entirely new proof is required, thus not meeting proof
composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name><strong>Weak Non-Separability</strong></name>
          <t>Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee
that an adversary cannot simply “remove” one of the component signatures
without evidence left behind. For example there are artifacts that a
carefully designed verifier may be able to identify, or that are
identifiable in later audits. This was later termed Weak
Non-Separability (WNS) <xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not
restrict an adversary from potentially creating a valid component
digital signature from a hybrid one (a signature stripping attack), but
rather implies that such a digital signature will contain artifacts of
the separation. Thus authentication is not simply provided by the sender
to the receiver through correct verification of the digital
signature(s), but potentially through further investigation on the
receiver side that may extend well beyond traditional signature
verification behavior. For instance, this can intuitively be seen in
cases of a message containing a context note on hybrid authentication,
that is then signed by all component algorithms/the hybrid signature
scheme. If an adversary removes one component signature but not the
other, then artifacts in the message itself point to the possible
existence of hybrid signature such as a label stating “this message must
be hybrid signed”. This might be a counter measure against stripping
attacks if the verifier expects a hybrid signature scheme to have this
property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional
signature security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name><strong>Strong Non-Separability</strong></name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take as input
a hybrid signature (and message) and output a valid component signature
(and potentially different message) that will verify correctly. In other
words, separation of the hybrid signature into component signatures
implies that the component signature will fail verification (of the
component signature scheme) entirely. Therefore, authentication is
provided by the sender to the receiver through correct verification of
the digital signature(s), as in traditional signature security
experiments. It is not dependent on other components, such as message
content checking, or protocol level aspects, such as public key
provenance. As an illustrative example distinguishing WNS from SNS,
consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and
<tt>sig_2 = Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m'
= (hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with
the hybrid artifact embedded in the message instead of the signature,
could be correctly verified. The separation would be identifiable
through further investigation but the signature verification itself
would not fail. Thus, this case shows WNS (assuming the verification
algorithm is defined accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ounsworth-pq-composite-sigs"/> has looked at reliance on
the public key certificate chains to explicitly define hybrid use of the
public key. Namely, that <tt>Sigma_1.pk</tt> cannot be used without
<tt>Sigma_2.pk</tt>. This implies pushing the hybrid artifacts into the
protocol and system level and a dependency on the security of other
verification algorithms (namely those in the certificate chain). This
further requires that security analysis of a hybrid digital signature
requires analysis of the key provenance, i.e., not simply that a valid
public key is used but how its hybridization and hybrid artifacts have
been managed throughout the entire chain. External dependencies such as
this may imply hybrid artifacts lie outside the scope of the signature
algorithm itself. SNS may potentially be achieveable based on
dependencies at the system level.</t>
          <!--
However, since those artifacts are outside the security definition
scope for a digital signature, namely definitions such EUF-CMA, we do
not include them in the SNS category.
-->

</section>
        <section anchor="backwardsforwards-compatibility">
          <name><strong>Backwards/Forwards Compatibility</strong></name>
          <t>Backwards compatibility refers to the property where a hybrid signature
may be verified by only verifying one component signature, allowing the
scheme to be used by legacy receivers. In general this means verifying
the traditional component signature scheme, potentially ignoring the
post-quantum signature entirely. This provides an option to transition
sender systems to post-quantum algorithms while still supporting select
legacy receivers. Notably, this is a verification property; the sender
has provided a hybrid digital signature, but the verifier is allowed,
due to internal policy and/or implementation, to only verify one
component signature. Backwards compatibility may be further decomposed
to subcategories where component key provenance is either separate or
hybrid so as to support implementations that cannot recognize (and/or
process) hybrid signatures or keys.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forward compatibility
assumes that hybrid signature schemes will be used for some time, but
that eventually all systems will transition to use only one
(particularly, only one post-quantum) algorithm. As this is very similar
to backwards compatibility, it also may imply separability of a hybrid
algorithm; however, it could also simply imply capability to support
separate component signatures. Thus the key distinction between
backwards and forwards compatibility is that backwards compatibility may
be needed for legacy systems that cannot use and/or process hybrid or
post-quantum signatures, whereas in forwards compatibility the system
has those capabilities and can choose what to support (e.g., for
efficiency reasons).</t>
          <t>As noted in <xref target="I-D.ietf-tls-hybrid-design"/>, ideally, forward/backward
compatibility is achieved using redundant information as little as
possible.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name><strong>Simultaneous Verification</strong></name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only are all component
signatures needed to achieve a successful verification present in the
hybrid signature, but also that verification of both component
algorithms occurs simultaneously. Namely, "missing" information needs to
be computed by the verifier so they cannot “quit” the verification
process before both component signatures are verified. SV mimics
traditional digital signatures guarantees, essentially ensuring that the
hybrid digital signature behaves as a single algorithm vs. two separate
component stages. Alternatively phrased, under an SV guarantee it is not
possible for an unerring verifier to initiate termination of the hybrid
verification upon successful verification of one component algorithm
without also knowing if the other component succeeded or failed.</t>
          <!--

What the sender is assured of is that one of two cases occurred: either
1) the receiver ignored the digital signatures or 2) the receiver
initiated verification of the digital signatures (resulting in either
successful or failed verification). WNS complicates this situation,
resulting in six cases instead of two: 1) the receiver ignored the
digital signatures, 2) the receiver verified the full hybrid combination
(with success or failure); 3) the receiver initiated verification of the
hybrid digital signatures, but terminated once the standard component
succeeded or failed; 4) the receiver initiated verification of the
hybrid digital signatures, but terminated once the post-quantum
component succeeded or failed; 5) the receiver initiated verification of
the standard signature only (with success or failure), and 6) the
receiver initiated verification of the post-quantum signature only (with
success or failure). It may initially appear that (3) and (5) (resp. (4)
and (6)) are similar, however (3) and (4) are precisely the cases
eliminated by SNS, i.e. that the verifier does not take as input the
hybrid digital signatures, instead only attempting verification on one
component. SNS thus improves the situation to only four options. Still,
the verifier can still terminate upon correctly checking only one
component signature without actually verifying both parts. One could
argue that a receiver who has checked the accuracy of their
implementation should be assured that both components are verifying.
This misconstrues the original intent though, which is to correctly
mirror traditional digital signatures properties in hybrid digital
signatures; ideally, the sender should be assured that there are only
two options: 1) ignore the digital signatures or 2) verify the digital
signatures (resulting in either failure or full
verification). Simultaneous Verification addresses this property.

-->

</section>
        <section anchor="hybrid-generality">
          <name><strong>Hybrid Generality</strong></name>
          <t>Hybrid generality means that a general signature combiner is defined,
based on inherent and common structures of component digital signatures
"categories." For instance, since multiple signature schemes use a
Fiat-Shamir Transform, a hybrid scheme based on the transform can be
made that is generalizable to all such signatures. Such generality can
also result in simplified constructions whereas more tailored hybrid
variants might be more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name><strong>High performance</strong></name>
          <t>Similarly to performance goals noted for hybridization of other
cryptographic components <xref target="I-D.ietf-tls-hybrid-design"/> hybrid signature
constructions are expected to be as performant as possible. For most
hybrid signatures this means that the computation time should only
minimally exceed the sum of the component signature computation time. It
is noted that performance of any variety may come at the cost of other
properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name><strong>High space efficiency</strong></name>
          <t>Similarly to space considerations in <xref target="I-D.ietf-tls-hybrid-design"/>,
hybrid signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts
are used), public keys, and the hybrid signature.  For the hybrid
signature, size should no more than minimally exceed the signature size
of the two component signatures. In some cases, it may be possible for a
hybrid signature to be smaller than the concatenationation of the two
component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name><strong>Minimal duplicate information</strong></name>
          <t>Similarly to <xref target="I-D.ietf-tls-hybrid-design"/>, duplicated information should
be avoided when possible. This might concern repeated information in
hybrid certificates or in the communication of component certificates in
additional to hybrid certificates (for example to achieve
backwards/forwards-compatibility), or sending multiple public keys or
signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-separability spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale,
representing <tt>degrees</tt> of separability hardness, visualized in
<xref target="fig-spectrum-non-separability"/>.</t>
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of non-separability from weakest to strongest.</name>
        <artwork><![CDATA[
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to
detect the change during verification. An example of this includes
simple concatenation of signatures without any artifacts used. Nested
signatures (where a message is signed by one component algorithm and
then the message-signature combination is signed by the second component
algorithm) may also fall into this category, dependent on whether the
inner or outer signature is stripped off without any artifacts
remaining.</t>
      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is
removed artifacts of the hybrid will remain (in the message, signature,
or at the protocol level, etc.). This may enable the verifier to detect
if a component signature is stripped away from a hybrid signature, but
that detectability depends highly on the type of artifact and
permissions.  For instance, if a message contains a label artifact "This
message must be signed with a hybrid signature" then the system must be
allowed to analyze the message contents for possible artifacts. Whether
a hybrid signature offers (Weak/Strong) Non-Separability might also
depend on the implementation and policy of the protocol or application
the hybrid signature is used in on the verifier side. Such policies may
be further ambiguous to the sender, meaning that the type of
authenticity offered to the receiver is unclear.  In another example,
under nested signatures the verifier could be tricked into interpreting
a new message as the message/inner signature combination and verify only
the outer signature.  In this case, the inner signature-tag is an
artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the
actual message, the certificate, or in other non-signature components,
this notion more closely ties to traditional algorithm security notions
(such as EUF-CMA) where security is dependent on the internal construct
of the signature algorithm and its verification. In this type, the
verifier can detect artifacts on an algorithmic level during
verification. For example, the signature itself may encode the
information that a hybrid signature scheme is used. Examples of this
type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--
Algorithms 16/17 and 18/19
of
, assuming a "loose" verification implementation where the
verifier may skill a final bit comparison check.
-->

<t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds
not only when both of the component signatures are present but also only
when the verifier has verified both signatures. Moreover, no information
is leaked to the receiver during the verification process on the
possibile validity/invalidity of the component signatures until both
verify (or fail to verify). This construct most closely mirrors
traditional digital signatures where, assuming that the verifier does
verify a signature at all, the result is either a positive verification
of a the full signature or a failure if the signature is not valid. For
hybrid signatures, a <tt>full signature</tt> implies the hybridization of both
component algorithms, and therefore the strongest non-separability
notion enforces an all-or-nothing approach to verification. Examples of
algorithms providing this type of security can be found in
<xref target="HYBRIDSIGDESIGN"/>.</t>
      <!--

Alg 10/11, 12/13, 14/15, 16/17, 18/19, and 20/21 of
are examples providing this type of security.
NB: Britta, I would leave out the concrete examples to avoid people focusing
on discussing the concrete algorithms.

-->

</section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping
attacks. This, however, depends strongly on where such evidence resides
(e.g., in the message, the signature, or somewhere on the protocol level
instead of at the algorithmic level). Even commonly discussed hybrid
approaches, such as concatenation, are not inherently tied to one type
of security (e.g., WNS or SNS). This can lead to ambiguities when
comparing different approaches and assumptions about security or lack
thereof. Thus in this section we cover artifact locations and also walk
through a high-level comparison of a few hybrid categories to show how
artifact location can differ within a given approach.  Artifact location
is tied to non-separability notions above; thus the selection of a given
security guarantee and general hybrid approach must also include finer
grained selection of artifact placement.</t>
      <!--

In this section we exemplify the difference in non-separability guarantees
depending on the artifact location for three types of hybridization, namely
concatenation, nesting, and 'fused' hybrid explained next.

-->

<!--

While the above discussion about the non-separability spectrum covers a spectrum
of security guarantees and existence of artifacts are linked to achieving those,
this (sub-)section covers some specific examples of artifact placement.

-->

<section anchor="artifact-locations">
        <name>Artifact locations</name>
        <t>There are a variety of artifact locations possible, ranging from within
the message to the signature algorithm to the protocol level and even
into policy, as shown in <xref target="tab-artifact-location"/>.  For example, one
artifact location could be in the message to be signed, e.g., containing
a label artifact.  Depending on the hybrid type, it might be possible to
strip this away. For example, a quantum attacker could strip away the
quantum-secure signature of a concatenated dual signature, and (being
able to forge, e.g., ECDSA signatures) remove the label artifact from
the message as well. So, for many applications and threat models, adding
an artificat in the message might not prevent stripping attacks.
Another artifact location could be in the public key certificates as
described in <xref target="I-D.ounsworth-pq-composite-sigs"/>. In yet another case,
artifacts may be present through the fused hybrid method, thus making
them part of the signature at the algorithmic level.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent
on system policy, then cryptographic analysis must necessarily be
reliant on specific policies and it may not be possible to describe a
scheme's security in a standalone sense.</t>
        <table anchor="tab-artifact-location">
          <name>Artifact placement levels</name>
          <thead>
            <tr>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature                                 </td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message                                    </td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in
different locations even within a single, common approach. We look at
the following categories of approaches: concatenation, nesting, and
fusion.  This is to illustrate that a given approach does not inherently
imply a specific non-separability notion and that there are subtleties
to the selection decision, since hybrid artifacts are related to
non-separability guarantees.  Additionally, this comparison highlights
how artifacts placement can be identical in two different hybrid
approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation,
nesting, and fusion) for clarity in description, before showing how each
one may have artifacts in different locations in
<xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: variants of hybridization where, for component
algorithms <tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is
calculated as a concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID,
m)</tt>.</t>
          </li>
        </ul>
        <!--

WNS may be a goal of a concatenation approach.  NB: I took it out
because I don't see a reason why there shouldn't been a policy or
protocol artificat making concatenation SNS.

-->

<ul spacing="normal">
          <li>
            <t>Nesting: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in
a layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID, (m,
sig_1))</tt>.</t>
          </li>
        </ul>
        <!--

WNS and potentially SNS (depending on prediction that $sig_1$ would be targeted
in a stripping attack) may be goals of a nesting approach.

-->

<ul spacing="normal">
          <li>
            <t>Fused hybrid: variants of hybridization where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly
separated to form one or more valid component constructs. For example,
if both signature schemes are signatures schemes constructed through the
Fiat-Shamir transform, the component signatures would include responses
r_1 and r_2 and challenges c_1 and c_2, where c_1 and c_2 are hashes
computed over the respective commitments comm_1 and comm_2 (and the
message).  A fused hybrid signature could consist of the component
responses, r_1 and r_2 and and a challenge c that is computed as a hash
over both commitments, i.e., c = Hash(comm_1,comm_2,message).  As such,
c does not belong to either of the component signatures but rather both,
meaning that the signatures are 'entangled'.</t>
          </li>
        </ul>
        <!--

SNS and potentially SV are goals of a true hybrid approach.

-->

<table anchor="tab-hybrid-approach-categories">
          <name>Artifact locations depending on the hybrid signature type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of artifacts of hybrid intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Concatenated</strong></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Nested</strong></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">
                <strong>Fused</strong></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>
        <t>As can be seen, while concatenation may appear to refer to a single type
of combiner, there are in fact several possible artifact locations
depending on implementation choices. Artifacts help to support detection
in the case of stripping attacks, which means that different artifact
locations imply different overall system implementation considerations
to be able to achieve such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as
there are no prescribed artifacts and therefore non-separability is not
achieved.  However, as can be seen, this does not imply that every
implementation using concatenation fails to achieve
non-separability. Thus, it is advisable for implementors to be
transparent about artifact locations.</t>
        <t>In cases 2 and 5 the artifacts lie within the message. This is notable
as the authenticity of the message relies on the validity of the
signature, and the artifact location means that the signature in turn
relies on the authentic content of the message (the artifact
label). This creates a risk of circular dependency. Alternative
approaches such as cases 3 and 4 solve this circular dependency by
provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may
be similar among some approaches. For instance, case 3 and case 6 both
contain artifacts in the certificate. Naturally these examples are
high-level and further specification on concrete schemes in the
categories are needed before prescribing non-separability guarantees to
each, but this does indicate how there could be a strong similarity
between such guarantees.  Such comparisons allow for a systematic
decision process, where security is compared and identified and, if
schemes are similar in the desired security goal, then decisions between
schemes can be based on performance and implementation ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 5, and 6 all push artifacts - and therefore the
signature validity - into the certificate chain. Naturally the entire
chain must then also use a similar combiner if a straightforward
security argument is to be made. Other cases, such as 8, 9, 10, and 11
put artifacts within the signature itself, meaning that these bear the
closest resemblance to traditional schemes where message authenticity is
dependent on signature validity.</t>
        <!--

The artifact placements in nesting combiners may be surprisingly similar
to those in concatenation option cases 2, 3, and 4. Namely, if `sig_2 =
Sigma_2.Sign(hybridAlgID, (m, sig_1))`, then the "message" `(m, sig_1)`
input into `Sigma_2.Sign` actually contains the artifact and acts as a
label.  Unless an additional label is provided within $m$ itself,
$sig_1$ does not therefore contain an artifact. Where the artifact is
located is necessarily dependent upon the threat model; guessing which
algorithm is more at risk from a stripping attack and choosing the order
of nesting accordingly may change the location of an artifact.

Under a fused combiner, artifacts of hybridization are present within
the signature. This can be coupled with artifacts in the message, such
as through use of a label, and/or artifacts in the certificate if keys
are also provisioned in a combined certificate.

-->

</section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need-For-Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in the
case of FIPS approval considerations as well as NIST, which has provided
basic guidance on hybrid signature use. NIST provides the following
guidance (emphasis added),</t>
      <ul empty="true">
        <li>
          <t>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards...<em><tt>hybrid
signatures</tt> can be accommodated by current standards in <tt>FIPS mode,</tt>
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>hybrid</tt> signature. <xref target="NIST_PQC_FAQ"/></t>
        </li>
      </ul>
      <t>The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity as to
whether only the algorithm must be approved and well implemented, or if
that implementation must go through an approval process as well.  As
such, there is a <tt>scale of approval</tt> that developers may consider as
to whether they are using at least one approved component algorithm
(<tt>1-out-of-n approved software module</tt>), or whether the implementation
of that component algorithm has gone through an approvals review (thus
making a <tt>all approved software module</tt>). The former <tt>1-out-of-n
approved software module</tt> would suggest a straightforward path for
FIPS-140 approvals based on the NIST guidelines; however, it is not
inconceivable that using a <tt>all approved software module</tt> could
automate much of the certification review and therefore be attractive to
developers.</t>
      <t>We provide a scale for the different nuances of approval of the hybrid
combiners. This is related to whether the combiner needs a new approval
process or falls under already approved specifications.</t>
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need-for-approval spectrum</name>
        <artwork><![CDATA[
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation  in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
]]></artwork>
      </figure>
      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to
approved (or even existing) signature schemes. Such a new, singular
algorithm relies on both traditional and nextgen principles.</t>
      <t>Next, is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security
of the approved algorithms. The combiner may, however, alter the
implementations.  As such it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm
implementation in a black-box way. It may potentially change the
specifics of the other component algorithm implementations. As long as
at least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>).</t>
      <t>In an All-Approved combiner, all algorithm implementations are used in a
blackbox way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid).  As long as
at least one component is approved, no new approval is needed (per
<xref target="NIST_PQC_FAQ"/>); thus as all algorithm implementations are approved the
requirement is satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Under traditional signature scheme security assumptions such as EUF-CMA,
the adversary 'wins' the security experiment if it can produce a new
message such that a message-signature pair <tt>(m, sig)</tt> with it correctly
verifies. This traditional security notion is challenged under a hybrid
construct.</t>
      <t>The most straightforward comparison would be for the adversary to
attempt to produce a new message <tt>m'</tt> that a message-hybrid signature
pair <tt>(m', sig_h)</tt> correctly verifies.  However, such a guarantee
depends on the signature being strongly non-separable. Otherwise, in
practical terms a security experiment must capture the case that an
existing or new message <tt>m</tt> could be verified with a component
signature, e.g., to produce <tt>(m', sig_1)</tt> that correctly verifies under
<tt>Sigma_1.Sign</tt>. Such considerations are beyond the scope of traditional
security analysis and represent considerations that would need to be
accounted for depending on the signature combiner method chosen.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used
in security protocols. It is an informational document and does not
directly affect any other Internet draft. The security considerations
for any specific implementation or incorporation of a hybrid scheme
should be discussed in the relevant specification documents.</t>
    </section>
    <section anchor="discussion-of-advantagesdisadvantages">
      <name>Discussion of Advantages/Disadvantages</name>
      <t>The design (and hence, security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards compatibility vs. SNS.</name>
        <t>There is an inherent mutual exclusion between backwards compatibility
and SNS.  While WNS allows for a valid separation under leftover
artifacts, SNS will ensure verification failure if a receiver attempts
separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards compatibility vs. hybrid unforgeability.</name>
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process
hybrid signatures, all differences between the legacy signature format
and the hybrid signature format must be allowed to be ignored, including
skipping verification of signatures additional to the classical
signature. As such, if a system does skip an component signature,
security does not rely on the security of all component signatures. Note
that this mutual exclusion occurs at the verification stage, as a hybrid
signature that is verified by a system that can process both component
schemes can provide hybrid unforgeability even if another (legacy)
system, processing the same hybrid signature, loses that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous verification vs. low need for approval.</name>
        <t>It seems that the more simultaneous verification is enforced by the
hybrid design, the higher is the need-for-approval as simultaneous
verification algorithms fuse (or 'entangle') the verification of the
component algorithms such that verification operations from the
different component schemes depend on each other in some way. For
example, concatenation of signatures in a black-box way without any
artefacts is, e.g., FIPS-approved, but the component signatures are
usually verified separately and no 'simultaneous verification' is
enforced.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This draft is based on the template of <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical order
who have contributed to pushing this draft forward, offered insights and
perspectives, and/or stimulated work in the area:</t>
      <t>Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Brendan Zember</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="HYBRIDKEM" target="https://doi.org/10.1007/978-3-030-25510-7_12">
        <front>
          <title>Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="J." surname="Brendel" fullname="Jacqueline Brendel">
            <organization/>
          </author>
          <author initials="M." surname="Fischlin" fullname="Marc Fischlin">
            <organization/>
          </author>
          <author initials="B." surname="Goncalves" fullname="Brian Goncalves">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
        <seriesInfo name="DOI" value="10.1007/978-3-030-25510-7_12"/>
        <refcontent>Post-Quantum Cryptography pp.206-226</refcontent>
      </reference>
      <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
        <front>
          <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="U." surname="Herath" fullname="Udyani Herath">
            <organization/>
          </author>
          <author initials="M." surname="McKague" fullname="Matthew McKague">
            <organization/>
          </author>
          <author initials="D." surname="Stebila" fullname="Douglas Stebila">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
      </reference>
      <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
        <front>
          <title>A Note on Hybrid Signature Schemes</title>
          <author initials="N." surname="Bindel" fullname="Nina Bindel">
            <organization/>
          </author>
          <author initials="B." surname="Hale" fullname="Britta Hale">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-hybrid-design">
        <front>
          <title>Hybrid key exchange in TLS 1.3</title>
          <author fullname="Douglas Stebila" initials="D." surname="Stebila">
            <organization>University of Waterloo</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shay Gueron" initials="S." surname="Gueron">
            <organization>University of Haifa</organization>
          </author>
          <date day="7" month="September" year="2023"/>
          <abstract>
            <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
      </reference>
      <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
        <front>
          <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
          <author fullname="Florence D" initials="F." surname="D">
            <organization>UK National Cyber Security Centre</organization>
          </author>
          <date day="2" month="February" year="2024"/>
          <abstract>
            <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-02"/>
      </reference>
      <reference anchor="I-D.ounsworth-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA for use in Internet PKI</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>D-Trust GmbH</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines Post-Quantum / Traditional composite Key
   Signaturem algorithms suitable for use within X.509, PKIX and CMS
   protocols.  Composite algorithms are provided which combine ML-DSA
   with RSA, ECDSA, Ed25519, and Ed448.  The provided set of composite
   algorithms should meet most X.509, PKIX, and CMS needs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-13"/>
      </reference>
      <reference anchor="I-D.becker-guthrie-noncomposite-hybrid-auth">
        <front>
          <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
          <author fullname="Alison Becker" initials="A." surname="Becker">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
            <organization>National Security Agency</organization>
          </author>
          <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
            <organization>National Security Agency</organization>
          </author>
          <date day="22" month="March" year="2022"/>
          <abstract>
            <t>   The advent of cryptographically relevant quantum computers (CRQC)
   will threaten the public key cryptography that is currently in use in
   today's secure internet protocol infrastructure.  To address this,
   organizations such as the National Institute of Standards and
   Technology (NIST) will standardize new post-quantum cryptography
   (PQC) that is resistant to attacks by both classical and quantum
   computers.  After PQC algorithms are standardized, the widespread
   implementation of this cryptography will be contingent upon adapting
   current protocols to accommodate PQC.  Hybrid solutions are one way
   to facilitate the transition between traditional and PQ algorithms:
   they use both a traditional and a PQ algorithm in order to perform
   encryption or authentication, with the guarantee that the given
   security property will still hold in the case that one algorithm
   fails.  Hybrid solutions can be constructed in many ways, and the
   cryptographic community has already begun to explore this space.
   This document introduces non-composite hybrid authentication, which
   requires updates at the protocol level and limits impact to the
   certificate-issuing infrastructure.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-becker-guthrie-noncomposite-hybrid-auth-00"/>
      </reference>
      <reference anchor="MOSCA">
        <front>
          <title>An Introduction to Quantum Computing, Oxford University Press</title>
          <author initials="P." surname="Kaye" fullname="Phillip Kaye">
            <organization/>
          </author>
          <author initials="R." surname="Laflamme" fullname="Raymond Laflamme">
            <organization/>
          </author>
          <author initials="M." surname="Mosca" fullname="Michele Mosca">
            <organization/>
          </author>
          <date year="2007" month="November"/>
        </front>
      </reference>
      <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
        <front>
          <title>Post-Quantum Cryptography FAQs</title>
          <author>
            <organization>National Institute of Standards and Technology (NIST)</organization>
          </author>
          <date year="2022" month="July" day="05"/>
        </front>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
