<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yan-anima-brski-cle-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="BRSKI-CLE">BRSKI-CLE: A Certificateless Enrollment framework in BRSKI</title>
    <seriesInfo name="Internet-Draft" value="draft-yan-anima-brski-cle-01"/>
    <author initials="L." surname="Yan" fullname="Lei YAN" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Ruanjiandadao Road</street>
          <city>Nanjing</city>
          <code>210000</code>
          <country>China</country>
        </postal>
        <email>ray.yanlei@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Operations and Management</area>
    <workgroup>anima</workgroup>
    <keyword>certificateless</keyword>
    <keyword>BRSKI</keyword>
    <keyword>enrollment</keyword>
    <keyword>framework</keyword>
    <abstract>
      <?line 51?>

<t>The Class 1 constrained IoT devices, defined in RFC7228, may be unable to use certificates within limited RAM. Exiting enrollment protocols of BRSKI are all using certificates. This document defines a certificateless enrollment framework in BRSKI (BRSKI-CLE) for constrained IoT devices. Considering the evolution towards quantum-safe algorithms, the framework is based on Key Encapsulation Mechanism (KEM). Cooperating with the authentication mechanism shown in I-D.selander-lake-authz, a constrained IoT device does not need to configure a public key to identify itself for the whole bootstrapping process. An authentication centre (AC) is used for issuing lightweight credentials, such as CBOR Web Tokens (CWTs), to constrained IoT devices. This document does not specify any lightweight credentials.</t>
    </abstract>
  </front>
  <middle>
    <?line 55?>

<section anchor="intro">
      <name>Introduction</name>
      <t>There are various constrained IoT devices in the hospital, such as anesthesia syringe pumps, electrocardiogram monitors, smart bed cards, etc.
The access gateway is required to authenticate each connected IoT device. 
Otherwise, adversaries can easily steal medical data through illegally accessed devices.
Certificates are widely utilized for authentication nowadays.
However, the RAM that can be used for authentication is commonly less than 10 KB in constrained medical IoT devices. 
Moreover, some extremely constrained medical IoT devices only have about 8 KB RAM.
These constrained IoT devices are also common in scenarios other than in the hospital. 
The IoT devices with around 10 KB RAM are defined as Class 1 constrained devices in <xref target="RFC7228"/>.
The limited RAM resources make the Class 1 constrained IoT devices hard to use certificates.
Even using CBOR to encode certificates, the certificate chain is also heavy for the Class 1 constrained IoT devices.
The CBOR encoded certificate chain in 4 length is around 4 KB, in 2 length is about 1.5 KB as shown in <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</t>
      <t>The Bootstrapping Remote Secure Key Infrastructure (BRSKI) <xref target="RFC8995"/> protocol provides a solution for secure zero-touch (automated) bootstrap of new (unconfigured) devices that are called "pledges". After being authenticated by the server "registrar", a pledge presents its key material to the network and acquires a network-specific identity. This process is called "enrollment". BRSKI typically uses Enrollment over Secure Transport (EST) <xref target="RFC7030"/>, which is based on certificates, as the enrollment protocol. Other alternative enrollment protocols in BRSKI, such as Constrained BRSKI<xref target="I-D.ietf-anima-constrained-voucher"/>, BRSKI-AE <xref target="I-D.ietf-anima-brski-ae"/> and <xref target="I-D.ietf-acme-integrations"/>, are also based on certificates.</t>
      <t>This document describes a certificateless enrollment framework in BRSKI (BRSKI-CLE) for constrained IoT devices.
Considering the evolution towards quantum-safe algorithms, the framework is based on the Key Encapsulation Mechanism (KEM).
The framework uses the public key of the server end to encapsulate the symmetric key.
The server end only needs to configure one public key to handle an enormous amount of client ends (the IoT devices).
Compared with encapsulating by the public key of the client end, such as EDHOC <xref target="I-D.ietf-lake-edhoc"/>, a unique public key is required to be configured on each IoT device.
When the amount of IoT devices is huge, encapsulating by the public key of the client end is less efficient in deployment.</t>
      <t>The client end is assumed to have previously known the server end's public key in <xref target="I-D.wiggers-tls-authkem-psk"/>.
Otherwise, the client end cannot encapsulate the symmetric key by the server end's public key.
In the BRSKI scenario, a pledge cannot previously know a domain server's public key.
Thus, the KEM-based authentication mechanism in <xref target="I-D.wiggers-tls-authkem-psk"/> cannot be utilized in the enrollment of BRSKI directly.</t>
      <t>The mutual authentication between the pledge and the registrar in BRSKI can also make by EDHOC, as shown in <xref target="I-D.selander-lake-authz"/>.
Moreover, the pledge's credential is supported transporting by reference rather than by value.
Therefore, cooperating with the authentication mechanism shown in <xref target="I-D.selander-lake-authz"/>, a constrained IoT device has no need to configure a public key to identify itself for the whole bootstrapping process.</t>
      <t>An authentication centre (AC) is used for issuing lightweight credentials, such as CBOR Web Tokens (CWTs), to the pledges in the enrollment phase of BRSKI.
This document does not specify any lightweight credentials.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t><strong>AC</strong>: The authentication centre provides the credential issuance for the pledges.</t>
        <t><strong>Domain</strong>: The set of entities that share a common local trust anchor.</t>
        <t><strong>enrollment</strong>: The process where a device presents key material to a network and acquires a network-specific identity.</t>
        <t><strong>imprint</strong>: The process where a device obtains the cryptographic key material to identify and trust future interactions with a network. This process is the step before enrollment, as defined in BRSKI <xref target="RFC8995"/>.</t>
        <t><strong>Pledge</strong>: The prospective (unconfigured) device, which has an identity installed at the factory.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>The architecture of the components in BESKI-CLE is shown in <xref target="Fig1"/>. Compared with the architecture of BRSKI, the CA is replaced by the AC. The AC can be implemented on the registrar or as a backend domain component.
After imprinting, the pledge can use BESKI-CLE to obtain a lightweight credential from the AC.
It is assumed that the communication between the registrar and the AC is protected by a security protocol, such as TLS or DTLS, and they can authenticate each other using the security protocol.</t>
      <figure anchor="Fig1">
        <name>Architecture Overview</name>
        <artwork><![CDATA[
                                           +------------------------+
   +--------------Drop-Ship----------------| Vendor Service         |
   |                                       +------------------------+
   |                                       | M anufacturer|         |
   |                                       | A uthorized  |Ownership|
   |                                       | S igning     |Tracker  |
   |                                       | A uthority   |         |
   |                                       +--------------+---------+
   |                                                      ^
   |                                                      |  BRSKI-
   V                                                      |   MASA
+-------+     ............................................|...
|       |     .                                           |  .
|       |     .  +------------+       +-----------+       |  .
|       |     .  |            |       |           |       |  .
|Pledge |     .  |   Join     |       | Domain    <-------+  .
|       |     .  |   Proxy    |       | Registrar |          .
|       <-------->............<------->   (AC)    |          .
|       | EDHOC  |            | EDHOC |           |          .
|       |     .  |            |       +-----+-----+          .
|IDevID |     .  +------------+             | BESKI-CLE      .
|       |     .           +-----------------+----------+     .
|       |     .           |                            |     .
|       |     .           | Authentication Centre(AC)  |     .
+-------+     .           |                            |     .
              .           +----------------------------+     .
              .                                              .
              ................................................
                             "Domain" Components
]]></artwork>
      </figure>
      <section anchor="mutual-authentication-between-the-pledge-and-registrar">
        <name>Mutual authentication between the pledge and registrar</name>
        <t>EDHOC can be a lightweight substitute of TLS for the mutual authentication between the pledge and registrar, as described in <xref target="I-D.selander-lake-authz"/>.
Moreover, the pledge's credential is supported transporting by reference rather than by value.
Thus, there is no need to configure a credential or a public key on the pledge to identify itself for the mutual authentication.</t>
        <t>The message flow of transporting credentials by reference is shown in <xref target="Fig2"/>, as described at the bottom of Figure 3 in <xref target="I-D.selander-lake-authz"/>.
ID_CRED_I is used to identify the pledge's authentication credential CRED_I.
Pledge sends ID_CRED_I to the registrar in the message_3 of EDHOC.
The registrar may use ID_CRED_I to obtain the pledge's credential CRED_I from the MASA.
Credential lookup of CRED_I may involve MASA or other credential databases.</t>
        <figure anchor="Fig2">
          <name>Transporting Credential by reference</name>
          <artwork><![CDATA[
                         Credential
Pledge       Registrar     Database
                             (MASA)
  |  ID_CRED_I   |              |
  +------------->|  ID_CRED_I   |
  |   message_3  +------------->|
  |              |              |
  |              |   CRED_I     |
  |    EDHOC     |<-------------+
  |              |              |
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="enrollment-framework">
      <name>Enrollment framework</name>
      <t>After imprinting, the pledge begins the process of enrollment.
A basic protocol flow is shown in <xref target="Fig3"/>.</t>
      <figure anchor="Fig3">
        <name>Basic Protocol Flow</name>
        <artwork><![CDATA[
+----------+               +-----------+                +--------+
|          |               |           |                |        |
|  Pledge  |               | Registrar |                |   AC   |
|          |               |           |                |        |
+-----+----+               +-----+-----+                +----+---+
      |                          |                           |
      |    [imprint finished]    | (A) Pledge's ID Register  |
      |                          +-------------------------->|
      |                          |                           |  
      |  (B) Public Key Request  |                           |
      +------------------------->|  (B) Public Key Request   |
      |                          +-------------------------->|
      |                          |                           |
      |                          |      (C) Public Key       |
      |     (C) Public Key       |<--------------------------+
      |<-------------------------+                           |
      |                          |                           |
      | (D) [Credential Request] |                           |
      +------------------------->| (D) [Credential Request]  |
      |                          +-------------------------->|
      |                          |                           |
      |                          |    (E) <Credential>       |
      |    (E) <Credential>      |<--------------------------+
      |<-------------------------+                           |
      |                          |                           |
          
          [] Indicates messages protected using AC's public key.
          <> Indicates messages protected using a symmetric key.
]]></artwork>
      </figure>
      <dl>
        <dt>Registering Pledge's ID (A):</dt>
        <dd>
          <t>After authenticating the pledge successfully during imprint, the registrar registers the pledge's ID on the AC. The pledge's ID is the unique identity set by the pledge's vendor, such as the MAC address. The AC may record the pledge's ID on the allowlist.</t>
        </dd>
        <dt>Requesting a public key (B):</dt>
        <dd>
          <t>The pledge makes a public key request to the AC. The pledge should send its ID in the request.</t>
        </dd>
        <dt>Public key response (C):</dt>
        <dd>
          <t>If the pledge's ID is on the allowlist, the AC returns its public key to the pledge.</t>
        </dd>
        <dt>Credential request (D):</dt>
        <dd>
          <t>The pledge interacts with the AC to request a local credential. Firstly, the pledge generates a symmetric key and encapsulates the symmetric key by the received public key. Secondly, the pledge sends the encapsulated key to the AC for credential transporting.</t>
        </dd>
        <dt>Credential response (E):</dt>
        <dd>
          <t>Firstly, the AC decapsulate the symmetric key by its private key. Secondly, the AC generates a credential for the pledge and encrypts the credential by the received symmetric key. Lastly, the AC sends the encrypted credential to the pledge.</t>
        </dd>
      </dl>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI uses a
   compact CBOR-encoded voucher.  The BRSKI voucher is extended with new
   data types that allow for smaller voucher sizes.  The Enrollment over
   Secure Transport (EST) protocol, used in BRSKI, is replaced with EST-
   over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.  This
   document Updates RFC 8366 and RFC 8995.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-21"/>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-ae">
          <front>
            <title>BRSKI-AE: Alternative Enrollment Protocols in BRSKI</title>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
              <organization>Siemens AG</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   This document defines an enhancement of Bootstrapping Remote Secure
   Key Infrastructure (BRSKI, RFC 8995) that supports alternative
   certificate enrollment protocols, such as CMP.  This offers the
   following advantages.

   Using authenticated self-contained signed objects for certification
   requests and responses, their origin can be authenticated
   independently of message transfer.  This supports end-to-end
   authentication (proof of origin) also over multiple hops, as well as
   asynchronous operation of certificate enrollment.  This in turn
   provides architectural flexibility where to ultimately authenticate
   and authorize certification requests while retaining full-strength
   integrity and authenticity of certification requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-ae-06"/>
        </reference>
        <reference anchor="I-D.ietf-acme-integrations">
          <front>
            <title>ACME Integrations for Device Certificate Enrollment</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Ernst &amp; Young</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="13" month="July" year="2023"/>
            <abstract>
              <t>   This document outlines multiple advanced use cases and integrations
   that ACME facilitates without any modifications or enhancements
   required to the base ACME specification.  The use cases include ACME
   integration with EST, BRSKI and TEAP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-acme-integrations-17"/>
        </reference>
        <reference anchor="I-D.selander-lake-authz">
          <front>
            <title>Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Aurelio Schellenbaum" initials="A." surname="Schellenbaum">
              <organization>Institute of Embedded Systems, ZHAW</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document describes a procedure for authorizing enrollment of new
   devices using the lightweight authenticated key exchange protocol
   Ephemeral Diffie-Hellman Over COSE (EDHOC).  The procedure is
   applicable to zero-touch onboarding of new devices to a constrained
   network leveraging trust anchors installed at manufacture time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-selander-lake-authz-03"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="25" month="August" year="2023"/>
            <abstract>
              <t>   This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a
   very compact and lightweight authenticated Diffie-Hellman key
   exchange with ephemeral keys.  EDHOC provides mutual authentication,
   forward secrecy, and identity protection.  EDHOC is intended for
   usage in constrained scenarios and a main use case is to establish an
   OSCORE security context.  By reusing COSE for cryptography, CBOR for
   encoding, and CoAP for transport, the additional code size can be
   kept very low.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-22"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-07"/>
        </reference>
        <reference anchor="I-D.wiggers-tls-authkem-psk">
          <front>
            <title>KEM-based pre-shared-key handshakes for TLS 1.3</title>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization>PQShield</organization>
            </author>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>Radboud University and MPI-SP</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
         </author>
            <date day="18" month="August" year="2023"/>
            <abstract>
              <t>   This document gives a construction for a Key Encapsulation Mechanism
   (KEM)-based authentication mechanism in TLS 1.3.  This proposal
   authenticates peers via a key exchange protocol, using their long-
   term (KEM) public keys.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiggers-tls-authkem-psk-00"/>
        </reference>
      </references>
    </references>
    <?line 258?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank...</t>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Va63LbNhb+z6fAOj9qx5YmdtJpokndVWRnoo0dZ221nUwm
m4FISOKaJFSClKrE6bPss+yT7XcAkAQpSrbT7V44k5gigINzP98B2el0PJXx
JPjII5mIHsvSXHg+z8RUpqseU1ngqXwch0qFMhmt5pgyPB299MJ5qier7OjR
o2ePjryIJ9MeE4nnZWEWYdrOi8ur18PO4Oy0x/psINIsnIREORJKsdMklVEU
iyRjk5THYinTaxYmTC/a8fh4nIpFj5U0vED6Ceb1WJDySdZZ8aTDkzDmnXGq
rsOOH4nOo0NPjpWMRCZUz8vnAdc3nsdTwXvsYi5SnkEMxSAwO+cJnwriwKPN
p6nM5z2maXre9bLnMdZhfp1t/UzzpO9EKYT+WQqCHfNsJlPQ6GAkTFSPnXXZ
O57gl5HiTITsXf8Nfst0ik0/ac567FXOlyLEYxHzMOqxlK+6kDUS4Z9neqjr
yxjD2BhURBBmMsVPlaVCZD12mfPk7yHE4wGX7FLyAIN+mMGUb2gkmdJvGWDt
0eEjXPpnnmRk7MEsTLjHPC+RaQx+FoKUcPly8PTZs2/t7XePHj+iWy9MJo1Z
3x0dPaXbYeekG4psYu3jQ+FZysNEBJ2FzP2ZSFtmGStyUR/yY9EJEzijNVwx
qgTcLRBpJ+LXokPK/lRbqB+LYCb92mNfKtHxxzLtiISUEHTIvsWUZTidilR1
skhpktci7szVNRyo0+kwPiYp/MzzRjPBBhGHEx8yRzg2lCMWiEXoC3WAm4l+
CJe2qjlgMV+xsWB5wseRYJlkuRKuhym2DDPYgEVhHGZYfNk/77LTX8MMdnOc
jc1TmUlfRorJiXFHBhdnPIpAkua6RLtsNAsVQ/zkerHhDDHQdG53h/WYZLtl
LO4xmH6T6F02wEAI4xAjGXQlFjLKyXwQecnTQLFf4KVZHncUnxDXSDWQO4bW
aLqztWJjrkAeS1+LFXKGz+cqj7QvsHPhz+A7Kma7r0/P92hfaSIc+5IiNTUy
JAQiIWlRXC5SM7lMSLoN/nRACmoVEaqE+hKZsURgAHbEvEk4zckEbJ6Po9Bn
1+AXI9ADNp+sWJhhj4lWHLG1nCF+2VjKjDaYz4lnWBX6gwL7SZNtH/egvtsf
7JFWclIKkUJazmlpFE5nGZID/md+KvSmPIJCFeKNccUGLy4u2c9izEbyWiAB
7g5+Hqm9A8t8ux0bblMIrebCJ4l4stq0b9eETBwGQSQ87wEbgn0Z5L4W5vOD
kH5+0ZFEOsO/BU9DmatNzJCdSG0zqeZhxqNKMA5XxogKOVMrcjkBC8RziA6f
9rGND48LJRJIzGKZULoktcQ8zRCLAaNhmpz5XR3Y3CcbsCliYolwhQZS8Use
psbQjlng1xwsgOEE+9TY7TLvAvPSZagE3ChYIKtAPojh8wTLVBitkLEFj+CP
AYhFDKWKQ0LUoOmMhVEkpgjmleUGxAujeAM3XZDmlnAxzESAReEn6xYN70kQ
dgFfYfUruRTgxgQasgv+8kxzRXlJtS8PySwxlIdtdJ7AooQdPmKvX5BdXJMV
4tT8yDuXqZB6WyVj6O1X+HJMTN+ylOktZ3wBs4xlnrGntCUlRTIV5c4N3mKS
oZKWb+JSIYTIx0CUTGNkaHgVWCUXcCnpPMJhFgAGIzFpjegXCZ6Cq6UYOI77
+bOtAF++GB9z0ju8S8k8pZkxUo9m55baAoWkQVv16HqnC5HYCqADHpNMoavN
M9Z3njDkxFDbWSttJvhiVWaqW7gxEundbE1to5ywJ3CdZApl0i5Gn0+gzgMa
O3LHtKEPu9+SrqHbMk1//nxLGSftamZe1LLqpYglGLkSPuVnKiPDBCUGE5CO
6JGpa3vsvQU6H8rySjcLhBfVSlXUMNKLMsQ+iVR2MoI0bBcxI4GGRLBXZXWq
zolYst08KSsExgs76tgjV4LbR9Dbzhz/T4XaQQWYZPDRsSAB3JwTsPFKW0WJ
FAHFdlIxDWmvdIfqlSEAthEcSaao6OhCRIylSMzkELQ6EZkusASDua/TG8lo
H3dMhkcRM9UrW9laYAuUTgiW5QoygGuDE7LVnAKZcpISNaBPOaAwxCjliZpL
ZOHd06uR0T5hyw8HqI2hP6sV/7r3cmVgxToe6jKdd+HGkDfR2LQdNhWgximQ
jnvrIcffNuLYL18ObIfSP2VrCwpI++WLVrQ73sS1RKhMWq1iIzd5TRyn/DQc
/4FIzvtDkByN3I7mdCRXBLQr0UoHXiG6nFAQSWDznaVqkqlaxbHIUrPEUHUW
6AJDKE7VYRxa4QaQA3PAMozqN3VHhFV4TI0TseFHIakaFIGssnoJ2SM1xnNO
CEJXk4pDUquN53WxKpqVk56evLoYuI5U9Tnag9BahL/kNWoNADMWlZTaGhrE
ONDF+xnJxiDnUrwaEEP9yaeANfcWg5Ya55zAU/VTeGQg5pFckafa7F1fgNoD
bw+MBRY6tS0IKMJs1wlVhroHfKNqshdVY0NnRxXDAWoNdoGKCO5udahGOm5y
0PWGhkMTdwUGcVK13aQhFsYDVBOCLZpwg+holtsIQ6h0TGBt7HNuV0LBBEHA
AkVaZOTkkbLTDOBLfhatrL3iPMtRWRr7j1FKhHUkKyrlQPpZlqwqIREA1alP
YyDoVDv6QUv9b2nUyIoVwqw2hNKqloR8SeVzKjjkTUXxsa6bigkakQStHfJx
iQ4xsOBRLrqmT0GmhJP4X9dkbuF+S6M549Ry/UFtpuf9Z/vMyjKqxb3mkFWU
TtZt1rr7NZ/egwdsJNI4TGQkpys8ePiwP3j4sMdG69ayMpdYT6cB13EUahyM
UejUytAloic6SgvCSugw0ZgpLACemunCXrQikaQmRx+cQgh/JlNNqNJEQawA
W0vTIxcuUWK7Jq7j90d1tHEYz1Heb9tVjjPIWehmNc+ooZ7PrAO6bJSeqMNd
iznJNc4mvEMHaPoA1vRVBW/r+FIn1UzMkUgo7hxP0VnBOV0zGaQE71qot9pE
jkwku0aDrVC8gJwzfZ5Q6ofObTODc2FHDWjAvkxJcXCwS1NWY22NM55Mcz4V
JieSUiAX0MDO+Y9XI2Bz/Ze9udD3l6d//XF4eXpC91ev+mdn5Y1nZ1y9uvjx
7KS6q1YOLs7PT9+cmMV4ymqPvJ3z/jtqBaD8nYu3o+HFm/7Zjgk3N57IJQ0a
0FaBU2W6lfUKUGlUO3j7z38cPkHy+hPUe3R4+AzFwvx4evjdE/yAmyRmN42k
zE9oauUh2QiT4ulUEiWUGmzlpHRyMDLWe9LMhx57Pvbnh0+O7QMSuPaw0Fnt
odbZ+pO1xUaJLY9atim1WXve0HSd3/672u9C787D5z9E8FfWOXz6w7FH+amf
+rMwE7oDNedOzoMSOwE3AonqTg7WOLWgXdeyqrC8DKeHqIGsjjKzFpq25dFd
fd8gw3nE/aqr7A+6OmL6g+JMCOkh0i5eYfeqftNREWWYMfevCTFZzFKy3fVM
H2tzDAqIW5/1FnSGUQkGlzSZBkTbsztaAhkXvHrDrIYRZzZMKdUCCbdAkYr3
Ao1AVJN5MnOKB01w099TBig6xqrAjc6uSO4T/D0oiKwMgFk7GzQnTeY8xqDE
Bllq6n777TeP3f3a72y49r310ZNUzjtXs3DenHzDfoLBJHXjqU7wxXVDVG7+
LbzclcoNO4cic8qt8NO0WnYvXm5Yn+l3bhq+spuLZQKwC9HvSeWKhdOEDKZ/
jlJy7fSreYGt3WW/R7v7X6fdxvW337EWy8zBAdH46atpsPP+Vd8rxNnXj7v3
uG7wz7tx6GH5/ThoWV5T9r4d3W951r68ptGbxt/GMyw3+KS+/C8Saa8+1aBL
un9ecbFh97ep/HVVX35ZJjuHk2p5QbNz7Gq3eHqMGboNqAvi7m5OI5qym6dt
srO7q27fcfn92vLhiVgMT24xXEGsqiybdi+v9Vy236S7bfnWkLq5w/J+vSkZ
6KbEGKBY3giZ++5ef7pd9jWdblt+h2tt+T2v7RVyxwTKjoZABjDpsvq5xx4Q
OmJMf5Ly/Y6LutjFgmqfWO58ITh/fp9jjApGeMbdLVqqoxaVjxU2zjMNvgg4
FC3kvc5Mys1s5+MA9P/umYg9hKLWbuMxhbMbocXaAWFN0i2HGK3aMufhGETD
iL6LTSK51LjZFcM5FaiLtIagj/Q5jKteiyXHMsuAOEH5pZHp8a2KH558HKBT
+Tgsj1Bc4WrGaB5FVNoyFLqeLRVKny1XlO15Su0sLavU8fExcax905x5VxPp
IxRC3TVaFnVvchQ7scTeVMG73qCaEEl5nev3XXYq7RImCxktzGyyvoHDDll6
6U2nl3SWshUGVzsV+jBXVeHoOrHktieLXWJnz9N5sdLBWg4lqFbPi8fNBYaG
o/K1Bd462fVdWmaUezgzbLWlR89r2+zfYRcnGx6V2XDkhopjTDdSKDkiPbZ9
rbe9uRvDNPbAqDjW0UdjBR30hvRKCLmgfNuqQ3gtMh/r97okwFpBrq42pLY+
uO85imnWzA2IpfHghkgUPrhOohVyVST6g4LE7+XCAUjtuljDTs7gvvWa1k22
7O+OucvfWx9gkzAJ1UwEH8zQbn/P6uobyl1WO2U7tX2LLaDk+A7LtzLPWEVg
9wWYNFWJ3krSqZ5Q2d2k38zj8RbK/23p77x8d1AToG15+5Tnm7kv/W7znDWn
/Srmb1m+e7LH3jtJz1rnw++3+0bK/yd23z3dY88r/o/blrfP+d+3O13O7fsP
bJgE9mM6W8fdw0BzdNcfNN6/VgSeH9+FAG9+heCU48dlOX6hq+Hbohq+RDXU
1bfImkTJzabIrj2vx+y3Qi6StMeNthKrXH9EOMnpk5wg13Rswj5ogMjUbqXq
SBCbWbBeHBC7Q/Ztjf30oHx5Qi/Dxg24u9CHjtVhqsGSA8aDINVfvtrDZ0KP
qfBlGmxihEdQTwRmqQ+wEWZU7XQYSMBaQxXH+gWzqs9KbV62kLouIoGRPAo0
/tafU5HAxVmyXkcMvHWpAVIlwNfIjHrz4WRNhlCtiXFQHEanAs1pYj7dqr/j
ragADzn5peAfeacpbfHKTVXvBLAFaBVruH0fWYHyLvqcVGXRqobmpiKhl97m
S7jaBxDUoTqfSKjN30jAoCJcICicUKKvwWQSNHYzzY55QVxSDlw9QAr94VKl
Bbfv6yLI6xoqbHJqVFQTEbQCccs3HtoaabigCS18g4SrIfd1Re2lcaEteoO6
9qK5qaZ6zmBnvMZyTUdEjz68dNRR8xdGGN58eUehWXzWZb49Qx/94qSrYT4b
9t/0Nw0jQ+s3PTSv79NnKpq4fv+JbJbk8Rg9Q/D9zgTttm4cipftEgllqcMo
Cq+F4Y0n13SuA1rYDlKOc/oyu52Ovv4F57PCoqo0AAA=

-->

</rfc>
