<?xml version='1.0' encoding='UTF-8'?>

<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hybrid-signature-spectrums-07" number="9955" updates="" obsoletes="" consensus="true" xml:lang="en" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">

  <front>

<!--[rfced] Note that we have updated the short title, which appears in the running header
In the PDF output, as follows.

Original:
 ietf-pquip-hybrid-spectrums

Current:
 Hybrid Signature Spectrums
-->
    <title abbrev="Hybrid Signature Spectrums">Hybrid Signature Spectrums</title>
    <seriesInfo name="RFC" value="9955"/>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization>SandboxAQ</organization>
      <address>
        <email>nina.bindel@sandboxaq.com</email>
      </address>
    </author>
    <author initials="B." surname="Hale" fullname="Britta Hale">
      <organization>Naval Postgraduate School</organization>
      <address>
        <email>britta.hale@nps.edu</email>
      </address>
    </author>
    <author initials="D." surname="Connolly" fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>durumcrustulum@gmail.com</email>
      </address>
    </author>
    <author initials="F." surname="Driscoll" fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>flo.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2026" month="April"/>

    <area>SEC</area>
    <workgroup>pquip</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on https://www.rfc-editor.org/search. -->

<keyword>example</keyword>

    <abstract>
<t>This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards and forwards compatibility, hybrid generality,
and Simultaneous Verification (SV).</t>
    </abstract>
  </front>
  <middle>

    <section anchor="introduction">
      <name>Introduction</name>
      <t>Plans to transition protocols to post-quantum cryptography sometimes focus on
confidentiality, given the potential risk of store and decrypt attacks, where
data encrypted today using traditional algorithms could be decrypted in the
future by an attacker with a sufficiently powerful quantum computer, also
known as a Cryptographically Relevant Quantum Computer (CRQC).</t>
      <t>It is important to also consider transitions to post-quantum authentication;
delaying such transitions creates risks. For example, attackers may be able
to carry out quantum attacks against RSA-2048 <xref target="RSA"/> years before the public
is aware of these capabilities. Furthermore, there are applications where
algorithm turnover is complex or takes a long time. For example, root
certificates are often valid for about 20 years or longer. There are also
applications where future checks on past authenticity play a role, such as
      long-lived digital signatures on legal documents.</t>

<!--[rfced] We note that both of the following terms are used in the document
(note "Project" vs. "Process"). Should these be made consistent?

NIST Post-Quantum Cryptography Standardization Project
NIST Post-Quantum Cryptography Standardization Process

Original:
   Research has indicated
   that implementation-independent attacks published in 2023 or earlier
   had broken 48% of the proposals in Round 1 of the NIST Post-Quantum
   Cryptography Standardization Project, 25% of the proposals not broken
   in Round 1, and 36% of the proposals selected by NIST for Round 2
   [QRCSP].
   ...
   Of note, some next-generation algorithms have received considerable
   analysis, for example, following attention gathered during the NIST
   Post-Quantum Cryptography Standardization Process [NIST_PQC_FAQ].
-->   

<!--[rfced] FYI - We updated "25% of the proposals not broken in Round 1" as
follows for clarity.

Original:
   Research has indicated
   that implementation-independent attacks published in 2023 or earlier
   had broken 48% of the proposals in Round 1 of the NIST Post-Quantum
   Cryptography Standardization Project, 25% of the proposals not broken
   in Round 1, and 36% of the proposals selected by NIST for Round 2
   [QRCSP].

Perhaps:
   Research indicates
   that implementation-independent attacks published in 2023 or earlier had
   broken 48% of the proposals in Round 1 of the NIST Post-Quantum
   Cryptography Standardization Project, 25% of the proposals not broken by
   the end of Round 1, and 36% of the proposals selected by NIST for Round 2
   [QRCSP].
-->   

      <t>Still, there have been successful attacks against algorithms using
post-quantum cryptography, as well as implementations of such
algorithms. Sometimes an attack exploits implementation issues, such as
<xref target="KYBERSLASH"/>, which exploits timing variations, or <xref target="HQC_CVE"/>, which exploits
implementation bugs. Sometimes an attack works for all implementations of the
specified algorithm. Research indicates that implementation-independent
attacks published in 2023 or earlier had broken 48% of the proposals in Round
1 of the NIST Post-Quantum Cryptography Standardization Project, 25% of the
proposals not broken by the end of Round 1, and 36% of the proposals selected by NIST
      for Round 2 <xref target="QRCSP"/>.</t>

      <t>Such cryptanalysis and security concerns are one reason to consider
'hybrid' cryptographic algorithms, which combine both traditional and
post-quantum (or more generally a combination of two or more) algorithms. A
core objective of hybrid algorithms is to protect against quantum computers
while at the same time making clear that the change is not reducing
security. A security premise for these algorithms is that if at least
one of the two component algorithms of the hybrid scheme holds, the
confidentiality or authenticity offered by that scheme is maintained. It
should be noted that the word 'hybrid' has many uses, but this document uses
'hybrid' only in this algorithm sense.</t>
      <t>Whether or not hybridization is desired depends on the use case and security
threat model. Users may recognize a need to start post-quantum transition,
even while issues such as those described above are a concern. For this,
hybridization can support transition. It should be noted that hybridization
is not necessary for all systems; recommendations on system types or analysis
methods for such determination are out of scope of this document. For cases
where hybridization is determined to be advantageous, a decision on how to
hybridize needs to be made. With many options available, this document is
intended to provide context on some of the trade-offs and nuances to
consider.</t>
      <t>Hybridization of digital signatures, where the hybrid signature may be
expected to attest to both standard and post-quantum components, is subtle to
design and implement due to the potential separability of the hybrid/dual
signatures and the risk of downgrade/stripping attacks.  There are also a
range of requirements and properties that may be required from hybrid
signatures, which will be discussed in this document. Some of these are
mutually exclusive, which highlights the importance of considering use-case-specific requirements.</t>
      <t>This document focuses on explaining a spectrum of different hybrid signature
scheme design categories and different security goals for them. It is
intended as a resource for designers and implementers of hybrid signature
schemes to help them decide what properties they do and do not require from
their use case. In scope limitations, it does not attempt to give concrete
recommendations for any use case. It also intentionally does not propose
concrete hybrid signature combiners or instantiations thereof. As with the
data authenticity guarantees provided by any digital signature, the security
guarantees discussed in this document are reliant on correct provisioning and
management of the keys involved, e.g., entity authentication, key revocation,
etc.  This document only considers scenarios with a single signer and a
single verifier; constructions with multiple signers or verifiers are out of
scope.</t>
      <section anchor="terminology">
        <name>Terminology</name>	
        <t>We follow existing documents on hybrid terminology <xref target="RFC9794"/> and
hybrid key encapsulation mechanisms (KEMs) <xref target="RFC9954"/> to
enable settling on a consistent language. We will make clear when this is not
possible. In particular, we follow the definitions of 'post-quantum
algorithm', 'traditional algorithm', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as defined in
<xref target="RFC4949"/>.</t>
        
<dl spacing="normal" newline="false">
  <dt>Signature scheme:</dt><dd><t>A signature scheme is defined via the
  following three algorithms:</t>
  <dl spacing="normal" newline="true">
    <dt><tt>KeyGen() -&gt; (pk, sk)</tt>:</dt><dd>A probabilistic key
    generation algorithm, which generates a public verifying key <tt>pk</tt>
    and a secret signing key <tt>sk</tt>.</dd>
    <dt><tt>Sign(sk, m) -&gt; (sig)</tt>:</dt><dd>A probabilistic signature
    generation, which takes as input a secret signing key <tt>sk</tt> and a
    message <tt>m</tt>, and outputs a signature <tt>sig</tt>.  In this document,
    the secret signing key <tt>sk</tt> is assumed to be implicit for
    notational simplicity, and the following notation is used: <tt>Sign(m)
    -&gt; (sig)</tt>. If the message <tt>m</tt> is comprised of multiple
    fields, <tt>m1, m2, ..., mN</tt>, this is notated as <tt>Sign(m) = Sign (m1,
    m2, ... mN) -&gt; (sig)</tt>.</dd>
    <dt><tt>Verify(pk, sig, m) -&gt; b</tt>:</dt><dd>A verification algorithm,
    which takes as input a public verifying key <tt>pk</tt>, a signature
    <tt>sig</tt>, and a message <tt>m</tt>, and outputs a bit <tt>b</tt>
    indicating <tt>accept (b=1)</tt> or <tt>reject (b=0)</tt> of the signature
    for the message <tt>m</tt>.</dd>
  </dl>
  </dd>

<!-- [rfced] We were unable to find the quoted text below in [RFC9794].
Is this quote from [RFC9794] or another reference?

Original:
   This is different from [RFC9794] where the term
   is used as a specific instantiation of hybrid schemes such that
   "where multiple cryptographic algorithms are combined to form a
   single key or signature such that they can be treated as a single
   atomic object at the protocol level."  
-->

<!--[rfced] To improve readability, may we break up this long sentence
into two sentences and update as follows?

Original:
   While it often makes sense for security purposes to require that
   the security of the component schemes is based on the hardness of
   different cryptographic assumptions, in other cases hybrid schemes
   might be motivated, e.g., by interoperability of variants on the
   same scheme and as such both component schemes are based on the
   same hardness assumption (e.g., both post-quantum assumptions or
   even both the same concrete assumption such as Ring LWE).

Perhaps:
   For security purposes, it often makes sense to require that
   the security of the component schemes be based on the hardness of
   different cryptographic assumptions, but in some cases, hybrid schemes
   might be motivated, e.g., by interoperability of variants on the
   same scheme. As such, both component schemes are based on the
   same hardness assumption (e.g., both post-quantum assumptions or
   even both the same concrete assumption, such as Ring Learning With Errors (LWE)).
-->      

  <dt>Hybrid signature scheme:</dt><dd>Following <xref target="RFC9794"/>, we
  define a hybrid signature scheme to be "a multi-algorithm digital signature
  scheme made up of two or more component digital signature algorithms". While
  it often makes sense for security purposes to require that the security of
  the component schemes is based on the hardness of different cryptographic
  assumptions, in other cases, hybrid schemes might be motivated, e.g., by
  interoperability of variants on the same scheme, and as such, both component
  schemes are based on the same hardness assumption (e.g., both post-quantum
  assumptions or even both the same concrete assumption, such as Ring Learning With Errors (LWE)).  We
  allow this explicitly. In particular, this means that in contrast to <xref
  target="RFC9794"/>, we will use the more general term 'hybrid signature
  scheme' instead of requiring one post-quantum and one traditional algorithm
  (i.e., Post-Quantum Traditional (PQ/T) hybrid signature schemes) to allow also the combination of
  several post-quantum algorithms. The term 'composite scheme' has sometimes
  been used as a synonym for 'hybrid scheme'. This is different from <xref
  target="RFC9794"/> where the term is used as a specific instantiation of
  hybrid schemes such that "where multiple cryptographic algorithms are
  combined to form a single key or signature such that they can be treated as
  a single atomic object at the protocol level". To avoid confusion, we will
  avoid the term 'composite scheme'.</dd>
  <dt>Hybrid signature:</dt><dd>A hybrid signature is the output of the hybrid
  signature scheme's signature generation. As a synonym, we might use 'dual
  signature'.  For example, NIST defines a dual signature as "two or more
  signatures on a common message" <xref target="NIST_PQC_FAQ"/>. For the same
  reason as above, we will avoid using the term 'composite signature', although
  it sometimes appears as a synonym for 'hybrid/dual signature'.</dd>
  <dt>Component (signature) scheme:</dt><dd>Component signature schemes are
  the cryptographic algorithms contributing to the hybrid signature
  scheme. This has a similar purpose as in <xref
  target="RFC9794"/>. 'Ingredient (signature) scheme' may be used as a
  synonym.</dd>
  <dt>Next-generation algorithms:</dt><dd>Following <xref
  target="RFC9954"/>, we define next-generation algorithms
  to be "algorithms that are not yet widely deployed but may eventually
  be widely deployed". Hybrid signatures are mostly motivated by preparation
  for post-quantum transition or use in long-term post-quantum deployment,
  hence the reference to post-quantum algorithms in this document.
  However, the majority of the discussion in this document applies equally
  well to future transitions to other next-generation algorithms.</dd>
  <dt>Policy:</dt><dd>Throughout this document, we refer to 'policy' in the
  context of, e.g., a system policy requiring verification of two signatures,
  an RFC description, guidance documentation, etc. Similar terminology may
  include 'security configuration settings' or related phrasing. We treat
  these terms as equivalent for the purposes of this document.</dd>
  <dt>Artifact:</dt><dd>An artifact is evidence of the sender's intent to
  hybridize a signature that remains even if a component signature is
  removed. Artifacts can be, e.g., at the algorithmic level (e.g., within the
  digital signature), at the protocol level (e.g., within the certificate),
  or on the system policy level (e.g., within the message). Artifacts should
  be easily identifiable by the receiver in the case of signature
  stripping.</dd>
  <dt>Stripping attack:</dt><dd>A stripping attack refers to a case where an
  adversary takes a message and hybrid signature pair and attempts to submit
  (a potential modification of) the pair to a component algorithm verifier,
  meaning that the security is based only on the remaining component scheme.
  A common example of a stripping attack includes a message and hybrid
  signature, comprised of concatenated post-quantum and traditional
  signatures, where an adversary with a quantum computer simply removes the
  post-quantum component signature and submits the (potentially changed)
  message and traditional component signature to a traditional verifier. This
  could include an authentic traditional certificate authority signature on a
  certificate that was originally hybrid-signed. An attribute of this is that
  an honest signer would attest to generating the signature. Stripping
  attacks should not be confused with component message forgery attacks.</dd>
  <dt>Component message forgery attacks:</dt><dd>A forgery attack refers to a
  case where an adversary attempts to forge a (non-hybrid) signature on a
  message using the public key associated with a component algorithm. A
  common example of such an attack would be a quantum attacker compromising
  the key associated with a traditional component algorithm and forging a
  message and signature pair.  Message forgery attacks may be formalized with
  experiments such as the Existential Unforgeability under Chosen Message Attack
  (EUF-CMA) <xref target="EUFCMA"/>, while the difference introduced in
  component message forgery attacks is that the key is accepted for both
  hybrid and single algorithm use. Further discussion of this appears in
  <xref target="euf-cma-challenges"/>.</dd>
</dl>
      </section>
      <section anchor="motivation">
        <name>Motivation for Use of Hybrid Signature Schemes</name>
        <t>Before diving into the design goals for hybrid digital signatures, it is
worth taking a look at motivations for them. As many of the arguments hold in
general for hybrid algorithms, we again refer to <xref target="RFC9954"/>,
which summarizes these well. In addition, we explicate the motivation for
hybrid signatures here.</t>
        <section anchor="complexity">
          <name>Complexity</name>
<!-- [rfced] Is "CRYSTALS-DILITHIUM" another name for "ML-DSA"? Or are they
separate schemes? Please review and let us know if/how this text may be clarified.

Current:
   For example, the
   signature scheme Module-Lattice-Based Digital Signature Algorithm
   (ML-DSA) [MLDSA] (also known as CRYSTALS-DILITHIUM) follows the well-
   known Fiat-Shamir transform [FS] to construct the signature scheme
   but also relies on rejection sampling that is known to give cache
   side channel information (although this does not lead to a known
   attack).

Section 1.2 of [MLDSA] (FIPS 204) states the following about ML-DSA
and CRYSTALS-DILITHIUM:
   ML-DSA is derived from one of the selected schemes, CRYSTALS-DILITHIUM
   [5 , 6 ], and is intended to protect sensitive U.S. Government
   information well into the foreseeable future, including after the
   advent of cryptographically relevant quantum computers. For the
   differences between ML-DSA and CRYSTALS- DILITHIUM, see Appendix D.
-->

          <t>Next-generation algorithms and their underlying hardness assumptions are
often more complex than traditional algorithms. For example, the signature
scheme Module-Lattice-Based Digital Signature Algorithm (ML-DSA) <xref target="MLDSA"/> (also known as CRYSTALS-DILITHIUM) follows the
well-known Fiat-Shamir transform <xref target="FS"/> to construct the signature scheme but
also relies on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).  Likewise, the
signature scheme FALCON <xref target="FALCON"/> uses complex sampling during signature
generation. Furthermore, attacks against the next-generation multivariate
schemes Rainbow <xref target="RAINBOW"/> and Great Multivariate Short Signature (GeMSS) <xref target="GEMSS"/> might raise concerns for
conservative adopters of other algorithms, which could hinder adoption.</t>
          <t>As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to traditional
algorithms, such as RSA. RSA is a relatively simple algorithm to understand
and explain, yet during its existence and use, there have been multiple
attacks and refinements, such as adding requirements to how padding and keys
are chosen, and implementation issues, such as cross-protocol attacks (e.g.,
component algorithm forgeries).  Thus, even in a relatively simple algorithm,
subtleties and caveats on implementation and use can arise over time. Given
the complexity of next-generation algorithms, the chance of such discoveries
and caveats needs to be taken into account.</t>
          <t>Of note, some next-generation algorithms have received considerable analysis,
for example, following attention gathered during the NIST Post-Quantum
Cryptography Standardization Process <xref target="NIST_PQC_FAQ"/>.  However, if and when
further information on caveats and implementation issues come to light, it is
quite possible that vulnerabilities will represent a weakening of security
rather than a full "break". Such weakening may also be offset if a hybrid
approach has been used.</t>
        </section>
        <section anchor="time">
          <name>Time</name>
          <t>In large systems, including national systems, space systems, large healthcare
support systems, and critical infrastructure, acquisition and procurement
time can be measured in years, and algorithm replacement may be difficult or
even practically impossible. Long-term commitment creates further urgency for
immediate post-quantum algorithm selection, for example, when generating root
certificates with their long validity windows.  Additionally, for some
sectors, future checks on past authenticity plays a role (e.g., many legal,
financial, auditing, and governmental systems).  This means there is a need
to transition some systems to post-quantum signature algorithms imminently.
However, as described above, there is a need to remain aware of potential,
hidden subtleties in next-generation algorithms' resistance to standard
attacks, particularly in cases where it is difficult to replace algorithms.
This combination of time pressure and complexity drives some transition
designs towards hybridization.</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>There are various security and usability goals that can be achieved through
hybridization. The following provides a summary of these goals while also
noting where goals are in conflict, i.e., that achievement of one goal
precludes another, such as backwards compatibility.</t>
        <section anchor="hybrid-authentication">
          <name>Hybrid Authentication</name>

          <t>One goal of hybrid signature schemes is security. As defined in <xref target="RFC9794"/>,
ideally a hybrid signature scheme can achieve 'hybrid authentication', which
is the property that (cryptographic) authentication is achieved by the hybrid
signature scheme, provided that a least one component signature algorithm
remains 'secure'. There might be, however, other goals in competition with
this one, such as backwards compatibility -- referring to the property where a
hybrid signature may be verified by only verifying one component signature
(see description below). Hybrid authentication is an umbrella term that
encompasses more specific concepts of hybrid signature security, such as
'hybrid unforgeability' described next.</t>
          <section anchor="hybrid-unforgeability">
            <name>Hybrid Unforgeability</name>

<!-- [rfced] The second sentence below seems to be saying the same thing as
the first. Should the second sentence be removed?

Current:
   Hybrid unforgeability is a specific type of hybrid authentication,
   where the security assumption for the scheme (e.g., EUF-CMA) is
   maintained as long as at least one of the component schemes maintains
   that security assumption.  We call this notion 'hybrid
   unforgeability'; it is a specific type of hybrid authentication.

Perhaps:
   Hybrid unforgeability is a specific type of hybrid authentication,
   where the security assumption for the scheme (e.g., EUF-CMA) is
   maintained as long as at least one of the component schemes maintains
   that security assumption.
-->

<!-- [rfced] For the ease of the reader, may we update "description below" and
"discussion below" to a section number? If so, please confirm that
Section 1.3.5 is correct.

Original:
   There might be, however, other goals in competition with this one,
   such as backward-compatibility - referring to the property where a
   hybrid signature may be verified by only verifying one component
   signature (see description below).
   ...
   For more details, we refer to our discussion below.

Perhaps:
   There might be, however, other goals in competition with this one,
   such as backward compatibility - referring to the property where a
   hybrid signature may be verified by only verifying one component
   signature (see Section 1.3.5).
   ...
   For more details, refer to Section 1.3.5.
-->

<!-- [rfced] We are having trouble understanding the first part of this
sentence. Would revising as shown below improve clarity while retaining
the intended meaning?

Original:
   Use cases where a hybrid scheme is used with, e.g., EUF-CMA security
   assumed for only one component scheme generally use hybrid techniques
   for their 'functional transition' pathway support.
   ...
   In contrast, use cases where a hybrid scheme is used with e.g., EUF-
   CMA security assumed for both component schemes without
   prioritisation between them can use hybrid techniques for both
   functional transition and security transition ...

Perhaps:
   In some use cases, a hybrid scheme is used with (for example) EUF-CMA security
   assumed for only one component scheme; these cases generally use hybrid techniques
   for their 'functional transition' pathway support.
   ...
   In contrast, in other use cases, a hybrid scheme is used with (for example) EUF-
   CMA security assumed for both component schemes without
   prioritisation between them; these cases can use hybrid techniques for both
   functional transition and security transition ...
-->


            <t>Hybrid unforgeability is a specific type of hybrid authentication, where the
security assumption for the scheme (e.g., EUF-CMA) is maintained as long as at
least one of the component schemes maintains that security assumption. We
call this notion 'hybrid unforgeability'; it is a specific type of hybrid
authentication. For example, the concatenation combiner in <xref target="HYBRIDSIG"/> is
'hybrid unforgeable'. As mentioned above, this might be incompatible with
backwards compatibility, where the EUF-CMA security of the hybrid signature
relies solely on the security of one of the component schemes instead of
relying on both, e.g., the dual message combiner using nesting in
	    <xref target="HYBRIDSIG"/>. For more details, refer to the discussion below.</t>	    
            <t>Use cases where a hybrid scheme is used with, e.g., EUF-CMA security assumed
for only one component scheme generally use hybrid techniques for their
'functional transition' pathway support.  For example, hybrid signatures may
be used as a transition step for gradual post-quantum adoption while
ensuring interoperability when a system includes both verifiers that only
support traditional signatures and verifiers that have been upgraded to
support post-quantum signatures.</t>
            <t>In contrast, use cases where a hybrid scheme is used with, e.g., EUF-CMA
security assumed for both component schemes without prioritization between
them can use hybrid techniques for both functional transition and security
transition (i.e., a transition to ensure security even if it may not be
known which algorithm should be relied upon).</t>
          </section>
        </section>
        <section anchor="proof-composability">
          <name>Proof Composability</name>
          <t>Under proof composability, the component algorithms are combined in such a
way that it is possible to prove a security reduction from the security
properties of a hybrid signature scheme to the properties of the respective
component signature schemes and, potentially, other building blocks such as
hash functions, key derivation functions, etc. Otherwise, an entirely new
proof of security is required, and there is a lack of assurance that the
combination builds on the standardization processes and analysis performed to
date on component algorithms. The resulting hybrid signature would be, in
effect, an entirely new algorithm of its own. The more the component
signature schemes are entangled, the more likely it is that an entirely new
proof is required, thus not meeting proof composability.</t>
        </section>
        <section anchor="weak-non-separability">
          <name>Weak Non-Separability</name>

<!-- [rfced] How may we update "algorithms/the" here?

Original:
   For instance, this can intuitively be seen in
   cases of a message containing a context note on hybrid
   authentication, that is then signed by all component algorithms/the
   hybrid signature scheme.

Perhaps:
   For instance, this can intuitively be seen in
   cases of a message containing a context note on hybrid
   authentication, that is then signed by all component algorithms in the
   hybrid signature scheme.
-->
	  
          <t>Non-separability was one of the earliest properties of hybrid digital
signatures to be discussed <xref target="HYBRIDSIG"/>. It was defined as the guarantee that
an adversary cannot simply "remove" one of the component signatures without
evidence left behind. For example, there are artifacts that a carefully
designed verifier may be able to identify or that are identifiable in later
audits. This was later termed Weak Non-Separability (WNS)
<xref target="HYBRIDSIGDESIGN"/>. Note that WNS does not restrict an adversary from
potentially creating a valid component digital signature from a hybrid one (a
signature stripping attack) but rather implies that such a digital signature
will contain artifacts of the separation. Thus, authentication that is
normally assured under correct verification of digital signature(s) is now
potentially also reliant on further investigation on the receiver side that
may extend well beyond traditional signature verification behavior. For
instance, this can intuitively be seen in cases of a message containing a
context note on hybrid authentication that is then signed by all component
algorithms/the hybrid signature scheme. If an adversary removes one component
signature but not the other, then artifacts in the message itself point to
the possible existence of a hybrid signature such as a label stating "this
message must be hybrid-signed". This might be a countermeasure against
stripping attacks if the verifier expects a hybrid signature scheme to have
this property. However, it places the responsibility of signature validity
not only on the correct format of the message, as in a traditional signature
security guarantee, but the precise content thereof.</t>
        </section>
        <section anchor="strong-non-separability">
          <name>Strong Non-Separability</name>
          <t>Strong Non-Separability (SNS) is a stronger notion of WNS, which is introduced in
<xref target="HYBRIDSIGDESIGN"/>. SNS guarantees that an adversary cannot take a
hybrid signature (and message) as input and output a valid component signature (and
potentially different message) that will verify correctly. In other words,
separation of the hybrid signature into component signatures implies that the
component signature will fail verification (of the component signature
scheme) entirely. Therefore, authentication is provided by the sender to the
receiver through correct verification of the digital signature(s), as in
traditional signature security experiments. It is not dependent on other
components, such as message content checking, or protocol-level aspects, such
as public key provenance. As an illustrative example distinguishing WNS from
SNS, consider the case of component algorithms <tt>Sigma_1.Sign</tt> and
<tt>Sigma_2.Sign</tt> where the hybrid signature is computed as a concatenation
<tt>(sig_1, sig_2)</tt>, where <tt>sig_1 = Sigma_1.Sign(hybridAlgID, m)</tt> and <tt>sig_2 =
Sigma_2.Sign(hybridAlgID, m)</tt>.  In this case, a new message <tt>m' =
(hybridAlgID, m)</tt> along with signature <tt>sig_1</tt> and <tt>Sigma_1.pk</tt>, with the
hybrid artifact embedded in the message instead of the signature, could be
correctly verified. The separation would be identifiable through further
investigation, but the signature verification itself would not fail. Thus,
this case shows WNS (assuming the verification algorithm is defined
accordingly) but not SNS.</t>
          <t>Some work <xref target="I-D.ietf-lamps-pq-composite-sigs"/> has looked at reliance on the
public key certificate chains to explicitly define hybrid use of the public
key, namely that <tt>Sigma_1.pk</tt> cannot be used without <tt>Sigma_2.pk</tt>. This
implies pushing the hybrid artifacts into the protocol and system level and a
dependency on the security of other verification algorithms (namely those in
the certificate chain). This further requires that security analysis of a
hybrid digital signature requires analysis of the key provenance, i.e., not
simply that a valid public key is used but how its hybridization and hybrid
artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the scope of
the signature algorithm itself. SNS may potentially be achievable based on
dependencies at the system level.</t>
        </section>
        <section anchor="backwardsforwards-compatibility">
          <name>Backwards and Forwards Compatibility</name>
          <t>Backwards compatibility refers to the property where a hybrid signature may
be verified by only verifying one component signature, allowing the scheme to
be used by legacy receivers. In general, this means verifying the traditional
component signature scheme, potentially ignoring the post-quantum signature
entirely. This provides an option to transition sender systems to
post-quantum algorithms while still supporting select legacy
receivers. Notably, this is a verification property; the sender has provided
a hybrid digital signature, but the verifier is allowed, due to internal
policy and/or implementation, to only verify one component
signature.</t>
          <t>Forwards compatibility has also been a consideration in hybrid proposals
<xref target="I-D.becker-guthrie-noncomposite-hybrid-auth"/>. Forwards compatibility assumes
that hybrid signature schemes will be used for some time but that eventually
all systems will transition to use only one (particularly, only one
post-quantum) algorithm. As this is very similar to backwards compatibility,
it also may imply separability of a hybrid algorithm; however, it could also
simply imply capability to support separate component signatures. Thus, the
key distinction between backwards and forwards compatibility is that
backwards compatibility may be needed for legacy systems that cannot use
and/or process hybrid or post-quantum signatures, whereas in forwards
compatibility, the system has those capabilities and can choose what to
support (e.g., for efficiency reasons).</t>
          <t>Ideally, backwards and forwards
compatibility is achieved using redundant information as little as possible, as noted in <xref target="RFC9954"/>.</t>
        </section>
        <section anchor="simultaneous-verification">
          <name>Simultaneous Verification</name>
          <t>Simultaneous Verification (SV) builds on SNS and was first introduced in
<xref target="HYBRIDSIGDESIGN"/>. SV requires that not only is the entire hybrid signature
(e.g., all component signature elements) needed to achieve a successful
verification present in the signature presented for verification but also
that verification of both component algorithms occurs roughly simultaneously.
Namely, "missing" information needs to be computed by the verifier so that a
normally functioning verification algorithm cannot "quit" the verification
process before the hybrid signature elements attesting for both component
algorithms are verified. This may additionally cover some error-injection and
similar attacks, where an adversary attempts to make an otherwise honest
verifier skip component algorithm verification. SV mimics traditional digital
signatures guarantees, essentially ensuring that the hybrid digital signature
behaves as a single algorithm vs. two separate component
stages. Alternatively phrased, under an SV guarantee, it is not possible for
an otherwise honest verifier to initiate termination of the hybrid
verification upon successful verification of one component algorithm without
also knowing if the other component succeeded. Note that SV does not prevent
dishonest verification, such as if a verifier maliciously implements a
customized verification algorithm that is designed with intention to subvert
the hybrid verification process or skips signature verification altogether.</t>
        </section>
        <section anchor="hybrid-generality">
          <name>Hybrid Generality</name>


<!-- [rfced] Should 'component digital signatures "categories"' be updated to
use singular 'signature' as shown in Perhaps A, recast as shown in
Perhaps B, or revised in some other way?

Original:
   Hybrid generality means that a general signature combiner is defined,
   based on inherent and common structures of component digital
   signatures "categories."

Perhaps A:
   Hybrid generality means that a general signature combiner is defined
   based on inherent and common structures of component digital
   signature "categories".

Perhaps B:
   Hybrid generality means that a general signature combiner is defined
   based on inherent and common structures of "categories" of the component digital
   signatures.
-->
	  
          <t>Hybrid generality means that a general signature combiner is defined based
on inherent and common structures of component digital signatures
"categories". For instance, since multiple signature schemes use a
Fiat-Shamir transform, a hybrid scheme based on the transform can be made
that is generalizable to all such signatures. Such generality can also result
in simplified constructions, whereas more tailored hybrid variants might be
more efficient in terms of sizes and performance.</t>
        </section>
        <section anchor="high-performance">
          <name>High Performance</name>
          <t>Similar to performance goals noted for hybridization of other cryptographic
components <xref target="RFC9954"/>, hybrid signature constructions are
expected to be as performant as possible. For most hybrid signatures, this
means that the computation time should only minimally exceed the sum of the
component signature computation time. It is noted that performance of any
variety may come at the cost of other properties, such as hybrid generality.</t>
        </section>
        <section anchor="high-space-efficiency">
          <name>High Space Efficiency</name>
<!-- [rfced] We could not find any mention of "space" in
draft-ietf-tls-hybrid-design (RFC-to-be 9954). Please review and let us
know how this citation may be updated.

Original:
   Similarly to space considerations in [I-D.ietf-tls-hybrid-design],
   hybrid signature constructions are expected to be as space performant
   as possible.
-->
          <t>Similar to space considerations in <xref target="RFC9954"/>, hybrid
signature constructions are expected to be as space performant as
possible. This includes messages (as they might increase if artifacts are
used), public keys, and the hybrid signature.  For the hybrid signature, size
should no more than minimally exceed the signature size of the two component
signatures. In some cases, it may be possible for a hybrid signature to be
smaller than the concatenation of the two component signatures.</t>
        </section>
        <section anchor="minimal-duplicate-information">
          <name>Minimal Duplicate Information</name>
          <t>Duplicated information should be avoided when possible, as a general point of
efficiency. This might include repeated information in hybrid certificates or
in the communication of component certificates in addition to hybrid
certificates (for example, to achieve backwards and forwards compatibility) or
sending multiple public keys or signatures of the same component algorithm.</t>
        </section>
      </section>
    </section>
    <section anchor="non-separability-spectrum">
      <name>Non-Separability Spectrum</name>
      <t>Non-separability is not a singular definition but rather is a scale
representing <tt>degrees</tt> of separability hardness, visualized in
      <xref target="fig-spectrum-non-separability"/>.</t>

<!-- [rfced] We made a few changes to Figures 1 and 2 (e.g., updated
spacing, added articles, and included punctuation). Please review.
-->
      
      <figure anchor="fig-spectrum-non-separability">
        <name>Spectrum of Non-Separability from Weakest to Strongest</name>
        <artwork><![CDATA[
   | ----------------------------------------------------------|
   | *No Non-Separability*                                    
   |                                                          
   | No artifacts exist.                                      
   | ----------------------------------------------------------|
   | *Weak Non-Separability*                                  
   |                                                          
   | Artifacts exist in the message, signature, system,       
   | application, or protocol.                                
   | ----------------------------------------------------------|
   | *Strong Non-Separability*                                
   |                                                          
   | Artifacts exist in the hybrid signature.                     
   | ----------------------------------------------------------|
   | *Strong Non-Separability with Simultaneous Verification* 
   |                                                          
   | Artifacts exist in the hybrid signature, and verification     
   | or failure of both components occurs simultaneously.     
   | ----------------------------------------------------------|
   ▼]]></artwork>
      </figure>
      <t>At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to detect
the change during verification. An example of this includes simple
concatenation of signatures without any artifacts used. Nested signatures
(where a message is signed by one component algorithm and then the
message-signature combination is signed by the second component algorithm)
may also fall into this category, dependent on whether the inner or outer
      signature is stripped off without any artifacts remaining.</t>

<!-- [rfced] Will readers understand what is meant by "hybrid" and "hybrids"
(noun) in these sentences? Should these be updated to "hybrid signature"
and "hybrid signatures" (or to something else), or is the current clear?

Original:
   Under Weak
   Non-Separability, if one of the component signatures of a hybrid is
   removed artifacts of the hybrid will remain (in the message,
   signature, or at the protocol level, etc.).
   ...
   Note that in this latter case, it is not
   possible for an adversary to strip one of the component signatures or
   use a component of the hybrid to create a forgery for a component
   algorithm.
   ...
   applies equally to any guidance or
   policy direction that specifies that at least one component algorithm
   of the hybrid has passed some certification type while not specifying
   requirements on the other component.
   ...
   however, we use it as motivation to highlight some points
   that implementers of hybrids may wish to consider when following any
   guidance documents that specify ...
   ...
   This type of need for approval (i.e., a requirement that an
   implementer is looking to follow regarding approval or certification
   of the software module implementation of a hybrid or its component
   algorithms) can drive some logistical decisions on what types of
   hybrids an implementer should consider.
   ...
   If the hybrid signature is
   stripped, such that a single component signature is submitted to a
   verification algorithm for that component along with the message that
   was signed by the hybrid, the result would be an EUF-CMA forgery for
   the component signature.
   ...
   Thus, if EUF-CMA security for hybrids is considered to be informally
   defined in the straightforward way as ...
-->

<!-- [rfced] How may we clarify "message/inner" here?

Original:
   In another example, under nested signatures the verifier
   could be tricked into interpreting a new message as the message/inner
   signature combination and verify only the outer signature.

Perhaps A:
   In another example, under nested signatures, the verifier
   could be tricked into interpreting a new message as the message and inner
   signature combination and verify only the outer signature.

Perhaps B:
   In another example, under nested signatures, the verifier
   could be tricked into interpreting a new message as the combination of the
   message and inner signature and verify only the outer signature.
-->

      <t>Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is removed,
artifacts of the hybrid will remain (in the message, in the signature, at the
protocol level, etc.). This may enable the verifier to detect if a component
signature is stripped away from a hybrid signature, but that detectability
depends highly on the type of artifact and permissions.  For instance, if a
message contains a label artifact "This message must be signed with a hybrid
signature", then the system must be allowed to analyze the message contents
for possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy of the
protocol or application the hybrid signature is used in on the verifier
side. Such policies may be further ambiguous to the sender, meaning that the
type of authenticity offered to the receiver is unclear.  In another example,
under nested signatures, the verifier could be tricked into interpreting a new
message as the message/inner signature combination and verify only the outer
signature.  In this case, the inner signature is an artifact.</t>
      <t>Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in the actual
message, the certificate, or other non-signature components, this notion
more closely ties to traditional algorithm security notions (such as EUF-CMA)
where security is dependent on the internal construct of the signature
algorithm and its verification. In this type, the verifier can detect
artifacts on an algorithmic level during verification. For example, the
signature itself may encode the information that a hybrid signature scheme is
used. Examples of this type may be found in <xref target="HYBRIDSIGDESIGN"/>.</t>
      <t>For schemes achieving the most demanding security notion, Strong
Non-Separability with Simultaneous Verification, verification succeeds
only when both of the component signatures are present and the
verifier has verified both signatures. Moreover, no information is leaked to
the receiver during the verification process on the possible validity of the
component signatures until both verify (or verification failure may or may
not be attributable to a specific component algorithm). This construct most
closely mirrors traditional digital signatures where, assuming that the
verifier does verify a signature at all, the result is either a positive
verification of the full signature or a failure if the signature is not
valid. For fused hybrid signatures, a <tt>full signature</tt> implies the fusion of
both component algorithms; therefore, this type of construction has the
potential to achieve the strongest non-separability notion, which  ensures an
all-or-nothing approach to verification, regardless of adversarial
action. Examples of algorithms providing this type of security can be found
in <xref target="HYBRIDSIGDESIGN"/>.</t>
    </section>
    <section anchor="art-spectrum">
      <name>Artifacts</name>
      <t>Hybridization benefits from the presence of artifacts as evidence of the
sender's intent to decrease the risk of successful stripping attacks. This,
however, depends strongly on where such evidence resides (e.g., in the
message, in the signature, or somewhere on the protocol level instead of at the
algorithmic level). Even commonly discussed hybrid approaches, such as
concatenation, are not inherently tied to one type of security (e.g., WNS or
SNS). This can lead to ambiguities when comparing different approaches and
assumptions about security or lack thereof. Thus, in this section, we cover
artifact locations and also walk through a high-level comparison of a few
hybrid categories to show how artifact location can differ within a given
approach. Artifact location is tied to non-separability notions as described above; thus,
the selection of a given security guarantee and general hybrid approach must
also include a finer-grained selection of artifact placement.</t>
      <section anchor="art-sep">
        <name>Artifacts vs. Separability</name>

<!--[rfced] To improve readability, may we update the second sentence below as
follows? The first sentence is included for context.

Original:
   The verifier could indeed ignore the artifact, hence the scheme achieving
   only weak non-separability and not strong non-separability.  It is
   rather that an artifact exists that could be identified if an
   investigation occurred, etc.

Perhaps:
   The verifier could indeed ignore the artifact, resulting in the scheme
   achieving only weak non-separability and not strong non-separability. However,
   an existing artifact could be identified if an investigation occurred.
-->   
	
        <t>Note that non-separability is a security notion of the signature scheme and
not directly related to artifacts -- however, artifacts may be used for detection of
separation. For instance, under strong non-separability, the scheme
would fail verification if separation occurs, while for weak non-separability,
some artifacts exist if separation occurs but verification would not
necessarily fail. The verifier could indeed ignore the artifact, resulting in the
scheme achieving only weak non-separability and not strong
non-separability. It is rather that an artifact exists that could be
identified if an investigation occurred, etc.  Under weak non-separability,
detection of separation may depend on non-cryptographic configurations or
other dependencies. Also, strong non-separability and weak non-separability
are properties of the signature scheme -- artifacts are not necessarily in the
signature and may appear in the signed message, certificate,
protocol, or policy (hence them not necessarily being related to the strong
non-separability and weak non-separability security notions). Artifacts may
still be useful (albeit dependent on system configurations) even if separable
signatures are used.</t>
      </section>
      <section anchor="art-locations">
        <name>Artifact Locations</name>
        <t>There are a variety of artifact locations possible, ranging from within the
message to the signature algorithm to the protocol level and even into
policy, as shown in <xref target="tab-artifact-location"/>.  For example, one artifact
location could be in the message to be signed, e.g., containing a label
artifact.  Depending on the hybrid type, it might be possible to strip this
away. For example, a quantum attacker could strip away the post-quantum
signature of a concatenated dual signature, and, being able to forge the
traditional signature, it could remove the label artifact from the message as
well. So, for many applications and threat models, adding an artifact in the
message might be insufficient under stripping attacks.  Another artifact
location could be in the public key certificates as described in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>. In such a case, the artifacts are still
present even if a stripping attack occurs. In yet another case, artifacts may
be present through the fused hybrid method, thus making them part of the
signature at the algorithmic level. Note that in this latter case, it is not
possible for an adversary to strip one of the component signatures or use a
component of the hybrid to create a forgery for a component algorithm. Such
signatures provide SNS. Consequently, this also implies that the artifacts of
hybridization are absolute in that verification failure would occur if an
adversary tries to remove them.</t>
        <t>Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is dependent on
system policy, then cryptographic analysis must necessarily be reliant on
specific policies, and it may not be possible to describe a scheme's security
in a standalone sense.  In this case, it is necessary to consider the
configuration of a particular implementation or use to assess security, which
could increase the risk of unknown and unanticipated vulnerabilities,
	regardless of the algorithms in use.</t>

        <table anchor="tab-artifact-location">
          <name>Artifact Placement Levels</name>
          <thead>
            <tr>
              <th align="left">Location of Artifacts of Hybrid Intent</th>
              <th align="left">Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signature</td>
              <td align="left">Algorithm</td>
            </tr>
            <tr>
              <td align="left">Certificate</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Algorithm agreement / negotiation</td>
              <td align="left">Protocol</td>
            </tr>
            <tr>
              <td align="left">Message</td>
              <td align="left">Policy</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="art-spectrum-example">
        <name>Artifact Location Comparison Example</name>
        <t>Here we provide a high-level example of how artifacts can appear in different
locations even within a single, common approach. We look at the following
categories of approaches: concatenation, nesting, and fusion.  This is to
illustrate that a given approach does not inherently imply a specific
non-separability notion and that there are subtleties to the selection
decision, since hybrid artifacts are related to non-separability guarantees.
Additionally, this comparison highlights how artifact placement can be
identical in two different hybrid approaches.</t>
        <t>We briefly summarize the hybrid approach categories (concatenation, nesting,
and fusion) for clarity in description before showing how each one may have
artifacts in different locations in <xref target="tab-hybrid-approach-categories"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Concatenation: Variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated as a
concatenation <tt>(sig_1, sig_2)</tt> such that <tt>sig_1 = Sigma_1.Sign(hybridAlgID ||
m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID || m)</tt>.</t>
          </li>
          <li>
            <t>Nesting: Variants of hybridization where, for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated in a
layered approach as <tt>(sig_1, sig_2)</tt> such that, e.g., <tt>sig_1 =
Sigma_1.Sign(hybridAlgID || m)</tt> and <tt>sig_2 = Sigma_2.Sign(hybridAlgID || (m ||
sig_1))</tt>.</t>
          </li>
          <li>
            <t>Fused hybrid: Variants of hybridization, where for component algorithms
<tt>Sigma_1.Sign</tt> and <tt>Sigma_2.Sign</tt>, the hybrid signature is calculated to
generate a single hybrid signature <tt>sig_h</tt> that cannot be cleanly separated
to form one or more valid component constructs. For example, if both
signature schemes are constructed through the Fiat-Shamir
transform, the component signatures would include responses r_1 and r_2 and
challenges c_1 and c_2, where c_1 and c_2 are hashes computed over the
respective commitments comm_1 and comm_2 (and the message).  A fused hybrid
signature could consist of the component responses r_1 and r_2 and a
challenge c that is computed as a hash over both commitments, i.e., c =
Hash((comm_1 || comm_2) || Hash2(message)).  As such, c does not belong to
either of the component signatures but rather both, meaning that the
signatures are 'entangled'.</t>
          </li>
        </ul>
        <table anchor="tab-hybrid-approach-categories">
          <name>Artifact Locations Depending on the Hybrid Signature Type</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Location of Artifacts of Hybrid Intent</th>
              <th align="left">Category</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"/>
              <td align="left"/>
              <th align="left">
                <strong>Concatenated</strong></th>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">None</td>
              <td align="left">No label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"/>
              <td align="left"/>
              <th align="left">
                <strong>Nested</strong></th>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">In message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">In cert</td>
              <td align="left">No label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">In message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left"/>
              <td align="left"/>
              <th align="left">
                <strong>Fused</strong></th>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">In signature</td>
              <td align="left">Public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">In signature and message</td>
              <td align="left">Label in message, public keys are in separate certs</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">In signature and cert</td>
              <td align="left">Public keys are in combined cert</td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">In signature and message and cert</td>
              <td align="left">Label in message, public keys are in combined cert</td>
            </tr>
          </tbody>
        </table>

<!-- [rfced] Will "As can be seen" be clear to readers in these two sentences?
Could it be updated to "As shown in Table 1" in the first sentence and
removed in the second sentence?

Original:
   As can be seen, while concatenation may appear to refer to a single
   type of combiner, there are in fact several possible artifact
   locations depending on implementation choices.
   ...
   However, as can be seen, this does not imply that
   every implementation using concatenation fails to achieve non-
   separability.

Perhaps:
   As shown in Table 1, while concatenation may appear to refer to a single
   type of combiner, there are in fact several possible artifact
   locations depending on implementation choices.
   ...
   However, this does not imply that
   every implementation using concatenation fails to achieve non-
   separability.
-->
	
        <t>As can be seen, while concatenation may appear to refer to a single type of
combiner, there are in fact several possible artifact locations depending on
implementation choices. Artifacts help to support detection in the case of
stripping attacks, which means that different artifact locations imply
different overall system implementation considerations to be able to achieve
such detection.</t>
        <t>Case 1 provides the weakest guarantees of hybrid identification, as there are
no prescribed artifacts and therefore non-separability is not achieved.
However, as can be seen, this does not imply that every implementation using
concatenation fails to achieve non-separability. Thus, it is advisable for
implementers to be transparent about artifact locations.</t>
        <t>In cases 2 and 5, the artifacts lie within the message. This is notable as the
authenticity of the message relies on the validity of the signature, and the
artifact location means that the signature in turn relies on the authentic
content of the message (the artifact label). This creates a risk of circular
dependency. Alternative approaches, such as cases 3, 4, 6, and 7, solve this
circular dependency by provisioning keys in a combined certificate.</t>
        <t>Another observation from this comparison is that artifact locations may be
similar among some approaches. For instance, cases 3 and 6 both contain
artifacts in the certificate. Naturally, these are high-level examples and
further specification on concrete schemes in the categories are needed before
prescribing non-separability guarantees to each, but this does indicate how
there could be a strong similarity between such guarantees.  Such comparisons
allow for a systematic decision process, where security is compared and
identified, and if schemes are similar in the desired security goal, then
decisions between schemes can be based on performance and implementation
ease.</t>
        <t>A final observation that this type of comparison provides is how various
combiners may change the security analysis assumptions in a system. For
instance, cases 3, 4, 6, and 7 all push artifacts -- and therefore the
signature validity -- into the certificate chain. Naturally, the entire chain
must then also use a similar combiner if a straightforward security argument
is to be made. Other cases, such as 8, 9, 10, and 11, put artifacts within the
signature itself, meaning that these bear the closest resemblance to
traditional schemes where message authenticity is dependent on signature
validity.</t>
      </section>
    </section>
    <section anchor="need-for-approval-spectrum">
      <name>Need for Approval Spectrum</name>
      <t>In practice, use of hybrid digital signatures relies on standards where
      applicable. This is particularly relevant in the cases where use of FIPS-approved software modules
      is
required but applies equally to any guidance or policy direction that
specifies that at least one component algorithm of the hybrid has passed some
certification type while not specifying requirements on the other component.
NIST provides the following guidance in  <xref target="NIST_PQC_FAQ"/> (emphasis added):</t>

<!-- [rfced] The quoted text below no longer appears at the URL provided for
[NIST_PQC_FAQ]: https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs.
That page was lasted updated on 19 November 2025.

We found an archived URL from the Internet Archive from 5 July 2022
(the original date used for this reference):
https://web.archive.org/web/20220705163944/https://csrc.nist.gov/Projects/
post-quantum-cryptography/faqs

May we update this reference to use the archived URL?

Original:
   Assume that in a [hybrid] signature, _one signature is generated
   with a NIST-approved signature scheme as specified in FIPS 186,
   while another signature(s) can be generated using different
   schemes_, e.g., ones that are not currently specified in NIST
   standards..._hybrid signatures can be accommodated by current
   standards in FIPS mode, as defined in FIPS 140, provided at least
   one of the component methods is a properly implemented, NIST-
   approved signature algorithm_. For the purposes of FIPS 140
   validation, any signature that is generated by a non-approved
   component scheme would not be considered a security function,
   since the NIST-approved component is regarded as assuring the
   validity of the hybrid signature.  [NIST_PQC_FAQ]
   ...
   [NIST_PQC_FAQ]
           National Institute of Standards and Technology (NIST),
           "Post-Quantum Cryptography FAQs", 5 July 2022,
           <https://csrc.nist.gov/Projects/post-quantum-cryptography/
           faqs>.
-->

<blockquote>Assume that in a [hybrid] signature, <em>one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186, while
another signature(s) can be generated using different schemes</em>, e.g.,
ones that are not currently specified in NIST standards ... <em><tt>[hybrid] signatures</tt> can be accommodated by current standards in <tt>"FIPS mode"</tt>,
as defined in FIPS 140, provided at least one of the component methods
is a properly implemented, NIST-approved signature algorithm</em>. For the
purposes of FIPS 140 validation, any signature that is generated by a
non-approved component scheme would not be considered a security
function, since the NIST-approved component is regarded as assuring
the validity of the <tt>[hybrid]</tt> signature.
</blockquote>
      <t>This document does not define a formal interpretation of the NIST statement;
however, we use it as motivation to highlight some points that implementers
of hybrids may wish to consider when following any guidance documents that
specify that 1) the signature scheme for one of the component algorithms
must be approved and 2) the said algorithm must be a well-implemented or 
certified implementation. This type of <tt>need for approval</tt> (i.e., a
requirement that an implementer is looking to follow regarding approval or
certification of the software module implementation of a hybrid or its
component algorithms) can drive some logistical decisions on what types of
hybrids an implementer should consider.</t>
      <t>In this respect, there is a <tt>scale of approval</tt> that developers may
consider as to whether they are using at least one approved component
algorithm implementation (<tt>1-out-of-n approved software module</tt>) or
whether every component algorithm implementation is individually approved
(<tt>all approved software module</tt>).</t>
      <t>We provide a scale for the different nuances of <tt>approval</tt> of the hybrid
combiners, where "approval" means that a software implementation of a
component algorithm can be used unmodified for creation of the hybrid
signature. This may be related to whether a hybrid combiner is likely to need
      dedicated certification.</t>

<!-- [rfced] We do not see "Generality" used elsewhere in Section 4. Should it
be removed from the title of Figure 2?

Original:
  Figure 2: Generality / Need for Approval Spectrum

Perhaps:
  Figure 2: Need for Approval Spectrum
-->
      
      <figure anchor="fig-generality-spectrum">
        <name>Generality / Need for Approval Spectrum</name>
        <artwork><![CDATA[
   | ---------------------------------------------------------|
   | *New Algorithm*                                          
   |                                                          
   | New signature scheme based on a selection of hardness    
   | assumptions.                                             
   |                                                          
   | Separate approval needed.                                
   | ---------------------------------------------------------|
   | *No Approved Software Module*                            
   |                                                          
   | Hybrid combiner supports security analysis that can be   
   | reduced to approved component algorithms, potentially    
   | changing the component implementations.                  
   |                                                          
   | Uncertainty about whether separate approval is needed.   
   | ---------------------------------------------------------|
   | *1-out-of-n Approved Software Module*                    
   |                                                          
   | Combiner supports one component algorithm and            
   | implementation in a black-box way but potentially        
   | changes the other component algorithm implementation(s). 
   |                                                          
   | No new approval needed if the black-box component        
   | (implementation) is approved.                            
   | ---------------------------------------------------------|
   | *All Approved Software Modules*                          
   |                                                          
   | Hybrid combiner acts as a wrapper, fully independent of  
   | the component signature scheme implementations.          
   |                                                          
   | No new approval needed if at least one component         
   | implementation is approved.                              
   | ---------------------------------------------------------|
   ▼]]></artwork>
      </figure>

      <t>The first listed "combiner" would be a new construction with a security
reduction to different hardness assumptions but not necessarily to approved
(or even existing) signature schemes. Such a new, singular algorithm relies
on both traditional and next-generation principles.</t>
      <t>Next is a combiner that might take inspiration from existing/approved
signature schemes such that its security can be reduced to the security of
the approved algorithms. The combiner may, however, alter the
implementations.  As such, it is uncertain whether new approval would be
needed as it might depend on the combiner and changes. Such a case may
potentially imply a distinction between a need for fresh approval of the
algorithm(s) and approval of the implementation(s).</t>
      <t>The 1-out-of-n combiner uses at least one approved algorithm implementation
in a black-box way (i.e., without modification to the software module
implementation for that algorithm). It may potentially change the specifics
of the other component algorithm implementations. If the premise is that no
new approval is needed so long as at least one component is approved, then
      this is likely considered sufficient.</t>    
      <t>In an all-approved combiner, every algorithm implementation is used in a
black-box way. A concatenation combiner is a simple example (where a
signature is valid if all component signatures are valid). Thus, as all
algorithm implementations are approved, a requirement that at least one of
hybrid component algorithms is approved would be satisfied.</t>
    </section>
    <section anchor="euf-cma-challenges">
      <name>EUF-CMA Challenges</name>
      <t>Unforgeability properties for hybrid signature schemes are more nuanced than
      for single-algorithm schemes.</t>

<!-- [rfced] Is "game" the correct word choice here? Or would "assumption"
(used earlier in the paragraph) be better?

Original:
   Namely, the most straightforward extension of the traditional EUF-CMA
   security game would be that an adversary can request hybrid
   signatures for messages of their choosing and succeeds if they are
   able to produce a valid hybrid signature for a message that was not
   part of an earlier request.
-->

      <t>Under the traditional EUF-CMA security assumption, an adversary requests
signatures for messages of their choosing and succeeds if they are able to
produce a valid signature for a message that was not part of an earlier
request. EUF-CMA can be seen as applying to the hybrid signature scheme in
the same way as single-algorithm schemes. Namely, the most straightforward
extension of the traditional EUF-CMA security game would be that an adversary
requests hybrid signatures for messages of their choosing and succeeds if
they are able to produce a valid hybrid signature for a message that was not
part of an earlier request. However, this has several layers of nuance under
a hybrid construct.</t>
      <t>Consider, for example, a simplistic hybrid approach using concatenated
component algorithms. If the hybrid signature is stripped, such that a single
component signature is submitted to a verification algorithm for that
component along with the message that was signed by the hybrid, the result
would be an EUF-CMA forgery for the component signature. This is because as
the component signing algorithm was not previously called for the message,
the hybrid signing algorithm was used to generate the signature. This is an
example of a component algorithm forgery, a.k.a. a case of cross-algorithm
attack or cross-protocol attack.</t>
      <t>The component algorithm forgery verifier target does not need to be the
intended recipient of the hybrid-signed message and may even be in an
entirely different system. This vulnerability is particularly an issue among
concatenated or nested hybrid signature schemes where individual component
verification could be possible. It should be noted that policy enforcement of
a hybrid verification does not mitigate the issue on the intended message
recipient: The component forgery could occur on any system that accepts the
      component keys.</t>

<!--[rfced] We are having difficulty parsing this sentence, particularly "is
considered to be informally defined in the straightforward way as that an
adversary can request...". Please review and let us know how it may be
updated for clarity.

Original:
   Thus, if EUF-CMA security for hybrids is considered to be informally
   defined in the straightfoward way as that an adversary can request
   hybrid signatures for messages of their choosing and succeeds if they
   are able to produce a valid hybrid signature for a message that was
   not part of an earlier request, implicit requirements must hold in
   order to avoid real-world implications.

Perhaps:
   Thus, if the straightforward EUF-CMA security assumption for hybrids is that
   an adversary requests
   hybrid signatures for messages of their choosing and succeeds if they
   are able to produce a valid hybrid signature for a message that was
   not part of an earlier request, implicit requirements must hold in
   order to avoid real-world implications.
-->   
<!-- [rfced] Please review the relationship between "cross-protocol attack"
and "component algorithm forgery" in the sentences below and let us know
if updates are needed for consistency. Also, in the last sentence below
(starts with "Otherwise"), perhaps "which can be seen as a type of
cross-protocol attack" can be removed as it is mentioned in the previous
sentence.

Original:
   such as cross-protocol attacks (e.g., component algorithm
   forgeries).
   ...
   This is an
   example of a component algorithm forgery, a.k.a. a case of cross-
   algorithm attack or cross-protocol attack.
   ...
   Namely, either component
   algorithm forgeries, a.k.a. cross-protocol attacks, must be out of
   scope for the use case or the hybrid signature choice must be
   strongly non-separable.  Otherwise, component algorithm forgeries,
   which can be seen as a type of cross-protocol attack, affect the type
   of EUF-CMA properties offered ...

Perhaps:
   such as cross-protocol attacks (a.k.a. component algorithm
   forgeries).
   ...
   This is an
   example of a component algorithm forgery (a.k.a. cross-
   algorithm attack or cross-protocol attack).
   ...
   Namely, either component
   algorithm forgeries (a.k.a. cross-protocol attacks) must be out of
   scope for the use case or the hybrid signature choice must be
   strongly non-separable.  Otherwise, component algorithm forgeries
   affect the type of EUF-CMA properties offered ...
-->
      
      <t>Thus, if EUF-CMA security for hybrids is informally defined
in the straightforward way as that an adversary requests hybrid signatures
for messages of their choosing and succeeds if they are able to produce a
valid hybrid signature for a message that was not part of an earlier request,
implicit requirements must hold in order to avoid real-world implications.
Namely, either component algorithm forgeries, a.k.a. cross-protocol attacks,
must be out of scope for the use case or the hybrid signature choice must
be strongly non-separable. Otherwise, component algorithm forgeries, which
can be seen as a type of cross-protocol attack, affect the type of EUF-CMA
properties offered and are a practical consideration that system designers
and managers should be aware of when selecting among hybrid approaches for
their use case.</t>
      <t>There are a couple approaches to alleviating this issue, as noted above.  One
is on restricting key reuse. As described in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>, prohibiting hybrid algorithm and
component algorithm signers and verifiers from using the same keys can help
ensure that a component verifier cannot be tricked into verifying the hybrid
signature. This would effectively put component forgeries out of scope for a
use case. One means for restricting key reuse is through allowed key use
descriptions in certificates. While prohibiting key reuse reduces the risk of
such component forgeries, and is the mitigation described in
<xref target="I-D.ietf-lamps-pq-composite-sigs"/>, it is still a policy requirement and not
a cryptographic assurance. Component forgery attacks may be possible if the
policy is not followed or is followed inconsistently across all entities that
might verify signatures using those keys.  This needs to be accounted for in
any security analysis. Since cryptographic provable security modeling has not
historically accounted for key reuse in this way, it should not be assumed
that systems with existing analyses are robust to this issue.</t>
      <t>The other approach noted for alleviating the component forgery risk is
through hybrid signature selection of a scheme that provides strong
non-separability.  Under this approach, the hybrid signature cannot be
separated into component algorithm signatures that will verify correctly,
thereby preventing the signature separation required for the component
forgery attack to be successful.</t>
      <t>It should be noted that weak non-separability is insufficient for mitigating
risks of component forgeries. As noted in <xref section="9.3"
sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>, in cases of hybrid algorithm selection that provide only weak
non-separability, key reuse should be avoided, as mentioned above, to
mitigate risks of introducing EUF-CMA vulnerabilities for component
algorithms.</t>
    </section>
    <section anchor="advantages-disadvantages">
      <name>Discussion of Advantages and Disadvantages</name>
      <t>The design (and hence security guarantees) of hybrid signature schemes
depend heavily on the properties needed for the application or protocol
using hybrid signatures. It seems that not all goals can be achieved
simultaneously as exemplified below.</t>
      <section anchor="backwards-compatibility-vs-sns">
        <name>Backwards Compatibility vs. SNS</name>
        <t>There is an inherent mutual exclusion between backwards compatibility and
SNS.  While WNS allows for a valid separation under leftover artifacts, SNS
will ensure verification failure if a receiver attempts separation.</t>
      </section>
      <section anchor="backwards-compatibility-vs-hybrid-unforgeability">
        <name>Backwards Compatibility vs. Hybrid Unforgeability</name>

<!--[rfced] May we update "additional" to "in addition" in this sentence?

Original:
   Since the goal of backwards compatibility is
   usually to allow legacy systems without any software change to be
   able to process hybrid signatures, all differences between the legacy
   signature format and the hybrid signature format must be allowed to
   be ignored, including skipping verification of signatures additional
   to the classical signature.

Perhaps:
   Since the goal of backwards compatibility is
   usually to allow legacy systems without any software change to be
   able to process hybrid signatures, all differences between the legacy
   signature format and the hybrid signature format must be allowed to
   be ignored, including skipping verification of signatures in addition
   to the classical signature.
-->   
	
        <t>Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability, as briefly
mentioned above. Since the goal of backwards compatibility is usually to
allow legacy systems without any software change to be able to process hybrid
signatures, all differences between the legacy signature format and the
hybrid signature format must be allowed to be ignored, including skipping
verification of signatures additional to the classical signature. As such, if
a system does skip a component signature, security does not rely on the
security of all component signatures. Note that this mutual exclusion occurs
at the verification stage, as a hybrid signature that is verified by a system
that can process both component schemes can provide hybrid unforgeability
even if another (legacy) system, processing the same hybrid signature, loses
that property.</t>
      </section>
      <section anchor="simultaneous-verification-vs-low-need-for-approval">
        <name>Simultaneous Verification vs. Low Need for Approval</name>
        <t>Hybrid algorithms that achieve simultaneous verification tend to fuse (or
'entangle') the verification of component algorithms such that verification
operations from the different component schemes depend on each other in some
way. Consequently, there may be a natural connection between achieving
simultaneous verification and a higher need for approval. As a contrasting
example, NIST accommodates concatenation of a FIPS-approved signature and
another (potentially non-FIPS approved) signature without any artifacts in
FIPS 140 validation <xref target="NIST_PQC_FAQ"/>; however, as the component signatures are
verified separately, it is not possible to enforce 'simultaneous
verification'.</t>
      </section>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This document discusses digital signature constructions that may be used in
security protocols. It is an Informational document and does not directly
affect any other documents. The security considerations for any specific
implementation or incorporation of a hybrid scheme should be discussed in the
relevant specification documents.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-lamps-pq-composite-sigs" to="COMP-MLDSA"/>
    <displayreference target="I-D.becker-guthrie-noncomposite-hybrid-auth" to="NC-HYBRID-AUTH"/>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>

<!-- 
draft-ietf-tls-hybrid-design-16
companion doc RFC 9954
-->
<reference anchor="RFC9954" target="https://www.rfc-editor.org/info/rfc9954">
<front>
<title>Hybrid Key Exchange in TLS 1.3</title>
<author initials="D." surname="Stebila" fullname="Douglas Stebila">
<organization>University of Waterloo</organization>
</author>
<author initials="S." surname="Fluhrer" fullname="Scott Fluhrer">
<organization>Cisco Systems</organization>
</author>
<author initials="S." surname="Gueron" fullname="Shay Gueron">
<organization>University of Haifa and Meta</organization>
</author>
<date month='April' year='2026'/>
</front>
<seriesInfo name="RFC" value="9954"/>
<seriesInfo name="DOI" value="10.17487/RFC9954"/>
</reference>

        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4949.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9794.xml"/>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="EUFCMA" target="https://blog.cryptographyengineering.com/euf-cma-and-suf-cma/">
          <front>
            <title>EUF-CMA and SUF-CMA</title>
            <author initials="M." surname="Green" fullname="Matthew Green">
              <organization/>
            </author>
          </front>
        </reference>
        <reference anchor="FALCON" target="https://falcon-sign.info/falcon.pdf">
          <front>
            <title>FALCON: Fast-Fourier Lattice-based Compact Signatures over NTRU</title>
            <author fullname="Pierre-Alain Fouque"/>
            <author fullname="Jeffrey Hoffstein"/>
            <author fullname="Paul Kirchner"/>
            <author fullname="Vadim Lyubashevsky"/>
            <author fullname="Thomas Pornin"/>
            <author fullname="Thomas Prest "/>
            <author fullname="Thomas Ricosset"/>
            <author fullname="Gregor Seiler"/>
            <author fullname="William Whyte"/>
            <author fullname="Zhenfei Zhang"/>
            <date day="10" month="January" year="2020"/>
          </front>
          <refcontent>Specification v1.2</refcontent>
        </reference>
        <reference anchor="FS" target="https://doi.org/10.1007%2F3-540-47721-7_12">
          <front>
            <title>How To Prove Yourself: Practical Solutions to Identification and Signature Problems</title>
            <author initials="A." surname="Fiat" fullname="Amos Fiat">
              <organization/>
            </author>
            <author initials="A." surname="Shamir" fullname="Adi Shamir">
              <organization/>
            </author>
            <date year="1986"/>
          </front>
          <refcontent>Advances in Cryptology -- CRYPTO' 86, Lecture Notes in Computer Science, vol. 263, pp. 186-194</refcontent>
          <seriesInfo name="DOI" value="10.1007/3-540-47721-7_12"/>
        </reference>
        <reference anchor="GEMSS" target="https://www-polsys.lip6.fr/Links/NIST/GeMSS_specification_round2_V2.pdf">
          <front>
            <title>GeMSS: A Great Multivariate Short Signature</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="April" day="15"/>
          </front>
        </reference>

        <reference anchor="HQC_CVE" target="https://nvd.nist.gov/vuln/detail/CVE-2024-54137">
          <front>
            <title>CVE-2024-54137: liboqs has a correctness error in HQC decapsulation</title>
            <author>
              <organization abbrev="NIST">National Institute of Standards and Technology</organization>
            </author>
            <date year="2024" month="December" day="06"/>
          </front>
        </reference>
        <reference anchor="HYBRIDSIG" target="https://eprint.iacr.org/2017/460">
          <front>
            <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
            <author initials="N." surname="Bindel" fullname="Nina Bindel">
              <organization/>
            </author>
            <author initials="U." surname="Herath" fullname="Udyani Herath">
              <organization/>
            </author>
            <author initials="M." surname="McKague" fullname="Matthew McKague">
              <organization/>
            </author>
            <author initials="D." surname="Stebila" fullname="Douglas Stebila">
              <organization/>
            </author>
            <date year="2017" month="May"/>
          </front>
          <refcontent>Cryptology ePrint Archive, Paper 2017/460</refcontent>
        </reference>

        <reference anchor="HYBRIDSIGDESIGN" target="https://eprint.iacr.org/2023/423">
          <front>
            <title>A Note on Hybrid Signature Schemes</title>
            <author initials="N." surname="Bindel" fullname="Nina Bindel">
              <organization/>
            </author>
            <author initials="B." surname="Hale" fullname="Britta Hale">
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
          <refcontent>Cryptology ePrint Archive, Paper 2023/423</refcontent>
        </reference>

<!-- [I-D.ietf-lamps-pq-composite-sigs]
draft-ietf-lamps-pq-composite-sigs-13
IESG State: IESG Eval as of 3/27/2026
-->
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lamps-pq-composite-sigs.xml"/>
	
<!-- [I-D.becker-guthrie-noncomposite-hybrid-auth]
draft-becker-guthrie-noncomposite-hybrid-auth-00 
IESG State: Expired as of 11/24/25
-->
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.becker-guthrie-noncomposite-hybrid-auth.xml"/>

        <reference anchor="KYBERSLASH" target="https://eprint.iacr.org/2024/1049">
          <front>
            <title>KyberSlash: Exploiting secret-dependent division timings in Kyber implementations</title>
            <author fullname="Daniel J. Bernstein"/>
            <author fullname="Karthikeyan Bhargavan"/>
            <author fullname="Shivam Bhasin"/>
            <author fullname="Anupam Chattopadhyay"/>
            <author fullname="Tee Kiah Chia"/>
            <author fullname="Matthias J. Kannwischer"/>
            <author fullname="Franziskus Kiefer"/>
            <author fullname="Prasanna Ravi"/>
            <author fullname="Goutam Tamvada"/>
            <date year="2024" month="June"/>
          </front>
          <refcontent>Cryptology ePrint Archive, Paper 2024/1049</refcontent>
        </reference>

<reference anchor="MLDSA" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
  <front>
    <title>Module-Lattice-Based Digital Signature Standard</title>
    <author>
      <organization abbrev="NIST">National Institute of Standards and Technology</organization>
    </author>
    <date month="August" year="2024"/>
  </front>
  <seriesInfo name="NIST FIPS" value="204"/>
  <seriesInfo name="DOI" value="10.6028/NIST.FIPS.204"/>
</reference>

        <reference anchor="NIST_PQC_FAQ" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs">
          <front>
            <title>Post-Quantum Cryptography FAQs</title>
            <author>
              <organization abbrev="NIST">National Institute of Standards and Technology</organization>
            </author>
            <date year="2022" month="July" day="05"/>
          </front>
        </reference>
        <reference anchor="QRCSP" target="https://cr.yp.to/papers/qrcsp-20231124.pdf">
          <front>
            <title>Quantifying risks in cryptographic selection processes</title>
            <author initials="D. J." surname="Bernstein" fullname="Daniel J. Bernstein">
              <organization/>
            </author>
            <date year="2023" month="November" day="24"/>
          </front>
        </reference>
        <reference anchor="RAINBOW" target="https://www.pqcrainbow.org/">
          <front>
            <title>PQC Rainbow</title>
            <author>
              <organization/>
            </author>
          </front>
        </reference>
<!-- [rfced] This reference currently points to a paper made available via
Ronald L. Rivest's MIT faculty page. This paper is also available for
free on ACM Digital Library (which is likely more stable). Would you like
this reference to point to the version on ACM Digital Library or keep the
current version?

Current:
   [RSA]      Rivest, R. L., Shamir, A., and L. Adleman, "A Method for
              Obtaining Digital Signatures and Public-Key
              Cryptosystems",
              <https://people.csail.mit.edu/rivest/Rsapaper.pdf>.

Perhaps:
   [RSA]    Rivest, R. L., Shamir, A., and L. Adleman, "A Method for
              Obtaining Digital Signatures and Public-Key
              Cryptosystems", Communications of the ACM, vol. 21, no. 2,
              pp. 120-126, DOI 10.1145/359340.359342,
              <https://doi.org/10.1145/359340.359342>.
-->
        <reference anchor="RSA" target="https://people.csail.mit.edu/rivest/Rsapaper.pdf">
          <front>
            <title>A Method for Obtaining Digital Signatures and Public-Key Cryptosystems</title>
            <author initials="R. L." surname="Rivest">
              <organization/>
            </author>
            <author initials="A." surname="Shamir">
              <organization/>
            </author>
            <author initials="L." surname="Adleman">
              <organization/>
            </author>
          </front>
        </reference>

<!-- Note to PE: Possible XML update for [RSA]
        <reference anchor="RSA">
          <front>
            <title>A Method for Obtaining Digital Signatures and Public-Key Cryptosystems</title>
            <author initials="R. L." surname="Rivest">
              <organization/>
            </author>
            <author initials="A." surname="Shamir">
              <organization/>
            </author>
            <author initials="L." surname="Adleman">
              <organization/>
            </author>
          </front>
          <refcontent>Communications of the ACM, vol. 21, no. 2, pp. 120-126</refcontent>
          <seriesInfo name="DOI" value="10.1145/359340.359342"/>
        </reference>
-->
      </references>
    </references>

    <section anchor="acknowledgements" numbered="false">
      <name>Acknowledgements</name>

<!-- [rfced] We do not see "template" in ietf-tls-hybrid-design (RFC-to-be
9954). Would another term be better here?

Original:
   This document is based on the template of
   [I-D.ietf-tls-hybrid-design].

Perhaps:
   This document is based on the hybrid key exchange
   defined in [RFC9954].
-->
      
      <t>This document is based on the template of <xref
      target="RFC9954"/>.</t>
      <t>We would like to acknowledge the following people in alphabetical
      order who have contributed to pushing this document forward, offered
      useful insights and perspectives, and/or stimulated work in the
      area:
      <contact fullname="D.J. Bernstein"/>, <contact fullname="Scott
      Fluhrer"/>, <contact fullname="John Gray"/>, <contact fullname="Felix Günther"/>,
      <contact fullname="Serge Mister"/>, <contact fullname="Mike Ounsworth"/>,
      <contact fullname="Max Pala"/>, <contact
      fullname="Douglas Stebila"/>, <contact fullname="Falko Strenzke"/>, and
      <contact fullname="Brendan Zember"/></t>
    </section>

  </back>

  
<!-- [rfced] Font styling

a) Use of <tt>

This file lists terms enclosed in <tt> in this document:
https://www.rfc-editor.org/authors/rfc9955-TT.txt

Some of these terms appear both with and without <tt>. For example, we see
"[hybrid] signatures" and "[hybrid]" enclosed in <tt>, but we also see
instances of "[hybrid]" and "hybrid" without <tt>. Please review to ensure
the usage of <tt> is correct and consistent. Let us know if any updates are
needed using OLD/NEW format.

  Note: In the HTML and PDF outputs, <tt> yields fixed-width font. In the
        TXT output, there is no change.

b) Use of <em>

This is only used in the direct quote in Section 4. The emphasis may be
difficult to see in the TXT output. Please review.

  Note: In the HTML and PDF outputs, <em> yields italics. In the TXT output,
        <em> yields an underscore before and after.
-->

<!-- [rfced] Terminology

a) Should the four instances of "scale" in the document be updated to
"spectrum"?

Current:
   Non-separability is not a singular definition but rather is a scale,
   representing degrees of separability hardness, visualized in
   Figure 1.
   ...
   Third on the scale is the Strong Non-Separability notion, in which
   separability detection is dependent on artifacts in the signature
   itself.
   ...
   In this respect, there is a scale of approval that developers may
   consider as to whether they are using at least one approved component
   algorithm implementation ...
   ...
   We provide a scale for the different nuances of approval of the
   hybrid combiners, where "approval" means that a software
   implementation of a component algorithm can be used unmodified for
   creation of the hybrid signature.


b) In Table 2, should instances of "cert" and "certs" be updates to
"certificate" and "certificates"?


c) The following terms are used in the document. Please review to ensure
consistent and correct usage. Let us know if any updates are needed.

component message forgery attack
component algorithm forgery (and component algorithm forgeries)
component forgery (and component forgeries)
component forgery attacks
-->

<!-- [rfced] Abbreviations

a) FYI - We have added expansions for the following abbreviations
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

 Great Multivariate Short Signature (GeMSS)
 Learning With Errors (LWE)
 Module-Lattice-Based Digital Signature Algorithm (ML-DSA)
 Post-Quantum Traditional (PQ/T)


b) Both the expansion and the acronym for the following terms are used
throughout the document. Would you like to update to using the expansion upon
first usage and the acronym for the rest of the document?

 Simultaneous Verification (SV)
 Strong Non-Separability (SNS)
 Weak Non-Separability (WNS)
-->

  
<!-- [rfced] Please review the "Inclusive Language" portion of the online
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature typically
result in more precise language, which is helpful for readers.

For example, please consider whether "black-box" should be updated.

In addition, please consider whether "traditional" should be updated for
clarity.  While the NIST website indicates that this term is potentially
biased, it is also ambiguous.  "Traditional" is a subjective term, as it is
not the same for everyone.

Link to NIST website:
https://web.archive.org/web/20250214092458/https://www.nist.gov/nist-research-library/nist-technical-series-publications-author-instructions#table1
-->

</rfc>
