<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.4.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC8126 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY RFC8179 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8179.xml">
<!ENTITY RFC9371 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9371.xml">
]>


<rfc ipr="trust200902" docName="draft-paulwh-crypto-components-02" category="info" submissionType="IETF">
  <front>
    <title abbrev="Crypto components">Documenting and Referencing Cryptographic Components in IETF Documents</title>

    <author initials="P." surname="Wouters" fullname="Paul Wouters">
      <organization>Aiven</organization>
      <address>
        <email>paul.wouters@aiven.io</email>
      </address>
    </author>
    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2025" month="February" day="11"/>

    
    
    

    <abstract>


<?line 28?>

<t>This document describes the history of how cryptographic components have been documented and referenced in the IETF, particularly in RFCs.
It also gives guidance for how such specification should happen in the future.</t>



    </abstract>



  </front>

  <middle>


<?line 33?>

<section anchor="introduction"><name>Introduction</name>

<t>The IETF has many diverse ways to document and reference cryptographic components that are used in protocols. 
These practices have changed over time, based on the IETF community, the IETF leadership, and the types of components needed by protocols.</t>

<t>The purpose of this document is to increase consistency and transparency in how the IETF handles cryptographic components.
This document does not define any new policies, but instead describes the many practices that have been used, particularly the practices that are considered best current practices today.</t>

<t>In this document, items such as cryptographic algorithms, base primitives, functions, methods, and constructions are all lumped under the term "cryptographic components".
Doing so avoids the conflicting definitions of what differentiates, for example, a method from a construction.</t>

<t>This document explicitly does not prohibit exceptions from the current practices.
Given the wide variety of historical practices, the difficulty of differentiating what is a base primitive and what is a cryptographic component, and the variety of needs in IETF working groups, the guidance in this document gives leeway for future specifications.</t>

</section>
<section anchor="referencing-cryptography-in-rfcs"><name>Referencing Cryptography in RFCs</name>

<t>RFCs that define secure protocols need to reference cryptographic components, or those RFCs define the components themselves.
It is uncommon for IETF protocols to define cryptographic components; instead, those components are defined elsewhere and referenced in the protocol RFC.</t>

<t>There are many sources for cryptographic references for RFCs.</t>

<section anchor="external"><name>External References for Specifying Cryptography</name>

<t>There are many sources of references for cryptography other than RFCs.
Such sources include:</t>

<t><list style="symbols">
  <t>National standards development organizations (SDOs) such as the U.S. National Institute of Standards and Technology (NIST) and the German Federal Office for Information Security (BSI)</t>
  <t>International SDOs such as the International Standards Organization (ISO) and the International Telecommunications Union (ITU)</t>
  <t>Academic papers and articles</t>
  <t>Internet Drafts not meant to proceed to RFC status</t>
  <t>Web sites of individual cryptographers</t>
</list></t>

</section>
<section anchor="rfcs-for-specifying-cryptography"><name>RFCs for Specifying Cryptography</name>

<t>In order to be published as an RFC, an Internet Draft must be sponsored by one of the following:</t>

<t><list style="symbols">
  <t>An IETF working group (and then the working group's Area Director)</t>
  <t>A research group in the Internet Research Task Force (IRTF)</t>
  <t>An Area Director who is individually sponsoring the draft</t>
  <t>The Independent Submissions Editor (ISE)</t>
  <t>The Internet Architecture Board</t>
</list></t>

<t>RFCs describing cryptographic components have been published by the first four of those.
Note, however, that Area Directors may not be willing to individually sponsor drafts for cryptographic components because other venues for RFC publication can garner better reviews, and because RFCs are often not required for specifying cryptographic components (see <xref target="external"/>).
Documents from working groups and those sponsored by Area Directors must get IETF consensus (as determined by the IESG) before publication as RFCs.</t>

<t>Many RFCs are specifications of cryptographic components, some are specific use cases of cryptography where additional operational constraints apply, and still others simply list cryptographic identifiers such as OIDs or IANA registration values.</t>

<t>Whenever possible, cryptographic components related to a specific protocol should be specified separately from the protocol itself.
This allows better review of the cryptography by cryptographers, and better review of the protocol by protocol experts.</t>

</section>
</section>
<section anchor="using-identifiers-for-cryptography-in-protocols"><name>Using Identifiers for Cryptography in Protocols</name>

<t>Although a proliferation of cryptographic components is a barrier to interoperability, the IETF encourages experimenting with new cryptographic components.
Identifiers used in IETF protocols are meant to be easy to obtain, as the IETF encourages experimentation and operational testing.
These identifiers are often called "code points" when they are listed in IANA registries, but might also be object identifiers (OIDs).
OIDs are covered in <xref target="oids"/>.</t>

<t>IANA registries are described in depth in <xref target="RFC8126"/>.
The following sections cover aspects of using IANA registries for cryptographic protocols; most of these aspects are the same for non-cryptographic protocols as well.</t>

<section anchor="per-registry-requirements-for-adding-code-points"><name>Per-Registry Requirements for Adding Code Points</name>

<t>In the past, some working groups had set the ability to add cryptographic component code points to IANA registries for their protocols be very strict, by requiring an RFC.
Recently, the rules for many registries have been updated to make it easier to get code points in order to allow for experimentation.
Where possible, the rules for cryptographic component registries should have an open registration policy (such as "Expert Review" or "Specification Required").
These do not need to be RFCs, but should be stable references.</t>

<t>Stable specifications are important references for developers who rely on a registry with code points.
Individual web sites are probably the least-used references for cryptographic components for good reasons: the URLs for them might change or disappear, the content of the web sites might change in ways that would affect the components' definition, and so on.</t>

<t>Although there is no IETF-wide consensus at the time of this writing as to whether specific versions of an Internet Drafts are appropriate for all registries as stable references, they have been used in the past for cryptographic purposes.
Until further guidance is developed, the decision about whether a draft is acceptable can continue to be addressed on a case-by-case basis by the designated expert for the specific registry.</t>

<t>There are some IANA registries where the limited allocation space does not allow for handing out many experimental code points, such as those where the number of code points is limited to 256 or fewer.
This necessitates a more conservative approach to code point allocation, and might instead force experiments to use private use code points instead of having allocations for code points that might only be used occasionally.</t>

</section>
<section anchor="private-use-code-points"><name>Private-Use Code Points</name>

<t>Every IANA registry for cryptographic components should reserve some code points for "private use".
These private-use code points can be used by protocol implementers to indicate components that do not have their own code points.
Generally, the RFC describing the protocol will define how the private-use code points can be used in practice.</t>

</section>
<section anchor="vendor-space-code-points"><name>Vendor Space Code Points</name>

<t>Some IANA registries use a an allocation scheme that allows for unlimited code points based on "vendor strings".
This allows for wide experimentation in a "vendor space" that acts as a private-use registration.
Such registrations might later be converted to an allocation not based on vendor names if the cryptographic component achieves IETF-wide consensus.</t>

</section>
<section anchor="recommendations-in-iana-registries"><name>Recommendations in IANA Registries</name>

<t>Each working group gets to specify the rules for the registries for the cryptographic components they create.
These rules require IETF consensus during the process of creating the registries.</t>

<t>Some IANA registries for specific cryptographic protocols have a column with a name such as "status" or "recommended" that indicates whether the the IETF recommends that a cryptographic component be used in that protocol.
The definition of the column should differentiate between recommending for implementation and recommending for deployment.</t>

<t><list style="symbols">
  <t>Recommendations for implementation tell developers of the protocol whether they should or must include the cryptographic component in their software or hardware implementations.
Such recommendations make the component available to users, letting them choose whether or not to use the component in their deployments.</t>
  <t>Recommendations for deployment tell the users of the protocol whether they should or must use the component in their deployments.</t>
</list></t>

<t>In the former case, the IETF is only speaking to developers; in the latter, the IETF is speaking directly to users who configure their use of the protocol.
This difference between "implementation" and "deployment" has sometimes tripped up working groups, but it is quite important to people trying to understand the IANA registry contents.</t>

<t>Working groups setting up such registries should strongly consider mandating that
decisions on setting the values in these columns to anything other than "MAY" require a standards track RFC.
That is, Independent Stream and IRTF RFCs would not be able to set or change the values in such a table in an IANA registry.</t>

<t>A working group's decision about whether a particular cryptographic component is mandatory, suggested, suggested against, or must not be used, might not be an easy one to make, particularly in light of also having to decide for both implementation and deployment.
Deployed cryptographic components that are known to be weak, such as those with keys that are now considered to be too small, present a significant challenge for working groups.
For such a weak component, clearly the recommendation should be against deployment, but a similar recommend against allowing implementation can make deployed systems unusable.
Such decisions are left to working groups, an are not covered here in any significant depth.
Working groups might batch their decision-making into periodic chosen intervals.
Working groups that choose to go against IETF-wide trends for cryptographic component should clearly state why their choices differ.</t>

<t>Having too many algorithms with a "recommended" status is harmful because it complicates implementations, deployments, and migrations to newer algorithms.</t>

<t>Registries that do not have columns for "implementation" and/or "deployment" can be updated by working groups or the IETF to add those columns.</t>

</section>
<section anchor="oids"><name>OIDs</name>

<t>Some IETF cryptographic protocols (notably CMS, CMP, S/MIME, and PKIX) use OIDs instead of IANA registries for code points.
OIDs are a hierarchical numbering system, normally stored in ASN.1 DER or BER encoding, and displayed as a series of positive integers separated by period (".") characters.</t>

<t>In IETF standards, many OIDs for cryptographic components normally are based on a part of the OID tree that was established in the early 1990s.
However, many OIDs come from other parts of the OID tree, and no particular part of the OID tree is better or worse than any other for unique identification of cryptographic components.
In fact, individuals who want to control part of the OID tree (called "private enterprise numbers") can get their own OID prefix directly from IANA as described in <xref target="RFC9371"/>.
The ASN.1 prefix for the IANA PEN tree is 1.3.6.1.4.1.</t>

</section>
<section anchor="identifiers-and-intellectual-property"><name>Identifiers and Intellectual Property</name>

<t>Assigning code points for proprietary cryptographic components or cryptographic components that have known intellectual property rights (IPR) is acceptable as long as any IETF protocol using those code points also allow the protocol to be run without using those components.
The IETF policy on IPR can be found in <xref target="RFC8179"/>.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document contains no actions for IANA.
However, it discusses the use of IANA registries in many places.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document is about the use of cryptography in IETF protocols, and how that cryptography is referenced in those protocols.</t>

<t>Reusing cryptographic components that have already been reviewed and approved in the IETF is usually better than creating new cryptography that must be reviewed before it is used in protocols.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC8126;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC8179;
&RFC9371;


    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

