<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pquip-hbs-state-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="HBS: State and Backup">Hash-based Signatures: State and Backup Management</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hbs-state-03"/>
    <author initials="T." surname="Wiggers" fullname="Thom Wiggers">
      <organization>PQShield</organization>
      <address>
        <postal>
          <country>The Netherlands</country>
        </postal>
        <email>thom@thomwiggers.nl</email>
      </address>
    </author>
    <author initials="K." surname="Bashiri" fullname="Kaveh Bashiri">
      <organization>BSI</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>kaveh.bashiri.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Kölbl" fullname="Stefan Kölbl">
      <organization>Google</organization>
      <address>
        <postal>
          <country>Switzerland</country>
        </postal>
        <email>kste@google.com</email>
      </address>
    </author>
    <author initials="J." surname="Goodman" fullname="Jim Goodman">
      <organization>Crypto4A Technologies</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>jimg@crypto4a.com</email>
      </address>
    </author>
    <author initials="S." surname="Kousidis" fullname="Stavros Kousidis">
      <organization>BSI</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>kousidis.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="07"/>
    <area>Security</area>
    <workgroup>Post-Quantum Use In Protocols</workgroup>
    <keyword>stateful hash-based signatures</keyword>
    <keyword>XMSS</keyword>
    <keyword>LMS</keyword>
    <keyword>state management</keyword>
    <abstract>
      <?line 174?>

<t>Stateful Hash-Based Signature Schemes (Stateful HBS) such as LMS, HSS, XMSS and
XMSS<sup>MT</sup> combine Merkle trees with One-Time Signatures (OTS) to
provide signatures that are resistant against attacks using large-scale quantum
computers. Unlike conventional stateless digital signature schemes, Stateful HBS have
a state to keep track of which OTS keys have been used, as double-signing with
the same OTS key allows forgeries.</t>
      <t>This document provides guidance and catalogs security considerations for the
operational and technical aspects of deploying systems that rely on Stateful HBS.
Management of the state of the Stateful HBS, including any handling of redundant key
material, is a sensitive topic. This document describes some approaches to handle the
associated challenges. It also describes the challenges that need to be resolved
before certain approaches should be considered.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://hbs-guidance.github.io/draft-hbs-state/draft-ietf-pquip-hbs-state.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-pquip-hbs-state/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Post-Quantum Use In Protocols Working Group mailing list (<eref target="mailto:pqc@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pqc/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/hbs-guidance/draft-hbs-state"/>.</t>
    </note>
  </front>
  <middle>
    <?line 190?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateful Hash-Based Signature Schemes (Stateful HBS) such as LMS, HSS, XMSS and
XMSS<sup>MT</sup> combine Merkle trees with One-Time Signatures (OTS) in order
to provide digital signature schemes that remain secure even when large-scale
quantum computers become available. The theoretic security of Stateful HBS is
well understood and depends only on the security of the underlying hash
function. As such, Stateful HBS can serve as an important building block for
quantum-resistant information and communication technology. Stateful HBS are
specified in <xref target="RFC8391"/>, <xref target="RFC8554"/>, and NIST <xref target="SP-800-208"/>.</t>
      <t>The private key of a Stateful HBS is a finite collection of OTS keys (typically
generated on-demand from a seed) and an associated data structure which keeps
track of which OTS keys have been used. This data structure is typically a
simple counter and often called an index; we refer to it as the <strong>state</strong> of the
private key. Each Stateful HBS private key can be used to sign a finite number
of messages, and the state must be updated with each generated signature.</t>
      <t>One must not reuse any OTS key that is part of a Stateful HBS private key. If
an attacker is able to obtain signatures for two different messages created
using the same OTS key, it is computationally feasible for that attacker to
create forgeries <xref target="BH16"/> <xref target="Fluhrer23"/>. As noted in
<xref target="MCGREW"/> and <xref target="ETSI-TR-103-692"/>, extreme care should be taken in order to avoid
the risk that an OTS key will be reused accidentally. Whereas <xref target="MCGREW"/>
identifies the fundamental failure modes of Stateful HBS and
proposes architectural strategies such as a reservation approach, and
<xref target="ETSI-TR-103-692"/> provides a broad analysis of state management challenges and
risks, this document complements both by cataloging concrete operational
patterns in <xref target="pot-sol"/> and by addressing backup and recovery considerations
<xref target="alt-backup-mgmt"/> not covered in prior work.</t>
      <t>In particular, the challenges below highlight why careful state and backup
management are essential in Stateful HBS:</t>
      <ul spacing="normal">
        <li>
          <t>Implementers must ensure that each creation of a signature updates the state
correctly.</t>
        </li>
        <li>
          <t>If the Stateful HBS private key is distributed to multiple signers at the same time,
implementers must ensure that they never use the same OTS key. This may
require synchronization between all signers.</t>
        </li>
        <li>
          <t>Additional operational complexity arises when part of the available OTS signatures are allocated to different devices (partial state transfer), or when state from different devices needs merging; these introduce risks of overlap, failure, and require careful coordination.</t>
        </li>
        <li>
          <t>If key backups are required, implementers must ensure that any backup
mechanism can not lead to re-using a previously used OTS key.</t>
        </li>
      </ul>
      <t>The following sections present, recall, and discuss various strategies for a
correct state and backup management for Stateful HBS.</t>
      <section anchor="when-are-stateful-hbs-appropriate">
        <name>When are Stateful HBS Appropriate?</name>
        <t>The issues with state management described above, as well as (for most parameter
sets) the limited number of signatures, lead to new requirements that most
developers will not be familiar with and that require careful handling in
practice: Stateful HBS are not general-purpose signature schemes. Most
applications, especially those that may produce unrestricted numbers of
signatures, should use <em>stateless</em> hash-based signature schemes like SLH-DSA
<xref target="FIPS205"/>, which use the same security assumptions, or schemes based on other
assumptions, such as ML-DSA <xref target="FIPS204"/>, instead. However, if run time, implementation
size, or signature or key sizes of stateless alternatives are prohibitive, and the
specific use case allows a very tight control of the signing environment, using
Stateful HBS may be an appropriate solution. It seems likely that in many
scenarios, it is only possible to meet the requirements set out in <xref target="req-state"/>
when using purpose-designed hardware, such as hardware-security modules.</t>
        <t>Stateful HBS are already profiled or discussed in several deployment-focused specifications and guidance documents. For example, <xref target="RFC9802"/> discusses suitable use cases for stateful HBS in X.509 (including firmware/software signing and CA certificates). The SUIT Mandatory-to-Implement algorithms specification <xref target="I-D.draft-ietf-suit-mti"/> defines an asymmetric profile that uses HSS-LMS, providing an interoperability target for software/firmware update IoT ecosystems. Additionally, the NSA <xref target="CNSA2.0"/> allows LMS (and XMSS) in specific application scenarios such as firmware/software signing.</t>
      </section>
    </section>
    <section anchor="specific-terminology-in-the-context-of-stateful-hbs">
      <name>Specific Terminology in the Context of Stateful HBS</name>
      <t>In this section we specify certain notions which are important in the
context of Stateful HBS.</t>
      <section anchor="private-key-components">
        <name>Private Key Components</name>
        <t>This section describes the two conceptual components that make up the private
key material used in Stateful HBS.</t>
        <dl>
          <dt>private key</dt>
          <dd>
            <t>the static, long-lived secret(s) from which OTS private keys are derived.
This material is stateless: given the scheme parameters, it deterministically
defines the set of OTS private keys but does not change over time.</t>
          </dd>
          <dt>state</dt>
          <dd>
            <t>the dynamically updated data structure that records which OTS key indices
have been consumed (often a monotone counter). This material is mutable and
must change on every successful signature.</t>
          </dd>
        </dl>
        <t>Conceptually, the private key and the state are distinct and should be handled
accordingly: the private key is a static secret, while the state is mutable,
evolves with each signature, and must be maintained with integrity and correctness. In some
implementations, these two components may be packaged together and not directly
separable; in such cases, this document’s guidance applies to the combined
artifact.</t>
      </section>
      <section anchor="state-management">
        <name>State Management</name>
        <t>In this document, <em>state management</em> refers to the handling and implementation
of the state of the private key.</t>
        <t>This includes mechanisms, which aim:</t>
        <ul spacing="normal">
          <li>
            <t>to securely update the state before the signature is released,</t>
          </li>
          <li>
            <t>to set up Stateful HBS where the state is separated in distinct, non-overlapping parts, so that signatures can
be generated from either part without risk of state reuse,</t>
          </li>
          <li>
            <t>to enable partial transfer of unused signature capacity between devices, and optionally merging state fragments without overlap,</t>
          </li>
          <li>
            <t>to enable effective but secure handling of private key and state backup
material,</t>
          </li>
          <li>
            <t>to guarantee the availability of both the private key and its state across
the lifetime of the key.</t>
          </li>
        </ul>
        <t>Note that in particular implementations of Stateful HBS, or in alternative
signature mechanisms, the state and private key might be inseparable. For
example, puncturable schemes <xref target="BSW16"/> represent such an alternative; they are
research-level constructions and are not currently standardized or deployed in
practice. However, even in these scenarios, this document's guidance should
still apply.</t>
      </section>
      <section anchor="backup-management">
        <name>Backup Management</name>
        <t>In order to mitigate failure of, e.g., devices storing key material and to
facilitate other types of disaster recovery, backups of private keys and their
associated states should be considered as part of a security architecture.</t>
        <t>In this document, <em>backup management</em> refers to all mechanisms surrounding the
goal to guarantee the availability of the private key and state, but with
special care to avoid state reuse by rolling back to a state in which
already-used OTS keys are still available.</t>
        <t>These mechanisms include procedures and protocols, which aim:</t>
        <ul spacing="normal">
          <li>
            <t>to securely store this private key and state material outside the in-use
signing device,</t>
          </li>
          <li>
            <t>to import an externally stored private key and state to a newly initiated
signing device,</t>
          </li>
          <li>
            <t>allow practicing with backup recovery and to ensure backups are valid.</t>
          </li>
        </ul>
        <t>Backup management can be viewed as a more specific type of state management; we
make this distinction to clarify the aims of our recommendations.</t>
      </section>
      <section anchor="keymovement">
        <name>Key Export, Key Import and Key Transfer</name>
        <t>As part of state and backup management, we will discuss mechanisms to export,
import or transfer private key and state material. In order to avoid
misunderstandings we now specify these notions more precisely.</t>
        <dl>
          <dt>key export</dt>
          <dd>
            <t>mechanism of exporting secret data, which yields (partial) private
key and state material, from the signing device to external storage. This
external storage may be given in digital or non-digital form.</t>
          </dd>
          <dt>key import</dt>
          <dd>
            <t>mechanism of importing secret data, which loads (partial) private
key and state material, from external storage to the signing device.</t>
          </dd>
          <dt>key transfer</dt>
          <dd>
            <t>a cryptographically protected transfer of ownership of private key and
state material from one signing device to another.</t>
          </dd>
        </dl>
        <t>Systems and architectures relying on key transfer are generally expected to
require fewer operational and manually-executed steps and checks to avoid state
reuse.</t>
        <t>Note that, at times, secure variants of the aforementioned primitives may be
required (e.g., securely importing/exporting the key). In these situations
cryptographic mechanisms should be utilized to provide assurances related to
the confidentiality (e.g., utilizing symmetric/asymmetric encryption
mechanisms) and/or integrity/authenticity (e.g., utilizing digital signatures,
hash functions, and keyed message authentication codes) of the associated
operations.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>An important aspect of the evaluation of various HBS state and
backup management options is to consider the operational costs associated with
the option(s) being evaluated. In the past, a traditional trust infrastructure
solution could utilize straightforward archival procedures to make copies of
the keys, which could then be distributed geographically to ensure their
availability and deliver a sufficiently resilient solution, all the while
enforcing whatever security protocols and procedures were required.
Unfortunately, Stateful HBS introduce an additional
constraint in that they need to ensure the state is never re-used. Hence,
archival procedures used for traditional trust infrastructures have to be
amended/redesigned to be used as viable options.</t>
      <t>One of the most problematic aspects of providing a long-lived resilient
solution is simply managing the physical media on which the keys/state are
stored externally (i.e., outside of the signing device) throughout the course
of their lifetime. Physical media/devices degrade over time, and the more
complex the media/device, the more likely it is to fail at some point in time
(e.g., data stored on a CD vs. data stored on a USB drive vs. data stored in a
Hardware Security Module). Combine that fact with the long lifetimes associated
with Stateful HBS keys (e.g., 10-20+ years) and the
difficulties associated with transferring keys between devices, and one finds
them self with a perplexing set of challenges that needs to be accounted for in
any state selection process of a proper state and backup management solution.
Compounding these complexities is the fact any resilient state management
system should also provide some means to verify the integrity of these
long-lived backups to ensure they will be valid when they are required, and to
ensure the operators know how to execute the necessary recovery procedure(s).</t>
      <t>Similarly, many of the prescribed state management options require a high
degree of operator involvement which means one should consider the costs
associated with training the operator element to ensure processes and procedures
are adhered to and failures caught early and corrected before a catastrophic
loss of security can occur (e.g., accidentally instantiating multiple instances
of a Stateful HBS key/state). Note that training is not a
fixed one-time cost either as long lifetimes will necessitate succession
planning amongst the operator element, and training of each successive generation
of participants. Mechanisms also should be put in place to mitigate the
ever-present insider threat via mechanisms such as M-of-N controls, ensuring
least-privileges amongst participants, and enforcing a segregation of duties to
ensure multiple parties are required to collude to undermine a solution's
security. Note that the segregation of duties must persist across successive
generations to ensure participants do not acquire multiple roles over time,
thereby undermining the intended segregation.</t>
      <t>In addition to the state management, implementers may consider implementing
mechanisms to prevent abrupt signature exhaustion. Implementations may
consider providing a configurable warning threshold, M, which is triggered
when M signatures remain. When the number of available signatures reaches
this threshold, the system should return a 'signatures nearing exhaustion' warning.
This warning condition should require explicit acknowledgment from the user
through a mechanism that cannot be trivially skipped.</t>
      <t>Another important consideration in deploying Stateful HBS is
the selection of an appropriate parameter set. Given the flexibility of these
schemes — such as adjustable tree heights or Winternitz parameters — there
exists a large variety of possible configurations. The availability of these
different configurations offers many trade-offs between signature
generation/verification time, signature size, and key generation time. Hence,
careful attention during the design phase is essential to ensure that the chosen
parameter set aligns optimally with the specific requirements of the intended
use case.</t>
      <t>Lastly, costs associated with any external dependencies required by a
particular solution (e.g., access to a public ledger or transparency log,
providing accurate time references and synchronization mechanisms, access to
attestation facilities, etc.) must be accounted for as well, particularly if a
system is operating in an offline mode that makes delivering these additional
capabilities all the more complicated and expensive.</t>
    </section>
    <section anchor="req-state">
      <name>Requirements for Secure State Management</name>
      <t>A system deploying Stateful HBS should fulfill certain requirements to allow securely
handling the state. The system must ensure that no two signing operations can
ever be issued from the same state. In addition, the generation of a signature
and update of the state should appear to be an <em>atomic transaction</em>. This means
that the system must not release a signature without irrevocably and correctly
updating the state.</t>
      <t>State management systems should satisfy all <em>ACID</em> properties:</t>
      <ul spacing="normal">
        <li>
          <t><em>Atomicity</em>: each operation on the state must be indivisible — such that it
either commits completely or leaves the state unchanged.</t>
        </li>
        <li>
          <t><em>Consistency</em>: the state before and after each update must reflect a valid
progression of available OTS indices, and no invalid or conflicting state is
ever observable.</t>
        </li>
        <li>
          <t><em>Isolation</em>: concurrent or overlapping operations (e.g., from separate
processes or devices) must not interfere in ways that could lead to state
reuse.</t>
        </li>
        <li>
          <t><em>Durability</em>: once a state transition (e.g., before issuing a signature) is
committed, that transition must survive crashes, power loss, or device
failure.</t>
        </li>
      </ul>
      <t>These requirements impose significant restrictions on the underlying technical
approach and a careful implementation of how the state will be updated or
synchronized. The abstraction layers of modern systems can make it particularly
difficult to guarantee that no two versions of the same state are present. The
main concerns here are</t>
      <ul spacing="normal">
        <li>
          <t>how the actual storage for the state is implemented,</t>
        </li>
        <li>
          <t>how it is modified,</t>
        </li>
        <li>
          <t>how an accidental/intentional failure/glitch might affect the state security.</t>
        </li>
      </ul>
      <t>A system may have a version of the private key stored in non-volatile memory
(e.g. a disk) and will load it into volatile memory (e.g. RAM) while processing.
Here, an implementer must ensure that these are always perfectly synchronized
<xref target="MCGREW"/>, meaning that no parts of the system are allowed to read any version of
the key during procedures which load, write or modify keys. This can be
particularly challenging if there are additional abstraction layers present in
the system, like additional caches which may affect reading/writing the state
and its potential existence in multiple locations.</t>
      <t>Cloning is another concern, as it can easily lead to re-using the same state.
This can happen for instance if a process which issues a signing operation is
forked, and no proper synchronization is enforced in the implementation to
guarantee correct state update. Virtual machine (VM) cloning is another
potential security risk here, as both backing up a VM into non-volatile memory
or live cloning of a VM can easily lead to a state re-use <xref target="MCGREW"/>. With users
shifting workloads to cloud service providers, the issue of VM cloning may
become more prevalent.</t>
      <t>Using dedicated cryptographic hardware is recommended to enforce these
requirements, ensure correct behavior and handle the complexity of state
management. In particular, this enables implementing rollback resistant
counters which can be difficult to achieve in a software-only fashion.</t>
      <t>On the verifier side, no state management is required. However, the verifier
needs to trust the signer to not have re-used the state. A verifier may want to
check that no state re-use happened in the past by a signer, before accepting a
signature.</t>
      <t>In practice, this can be done if the verifier has access to all signatures
issued by the signer. As the signatures contain the index of the OTS key used,
detecting if an index was used more than once becomes trivial. In practice,
such a (public) data structure which contains all signatures may already be
present in some use cases (e.g. certificate transparency <xref target="RFC9162"/>) or could
be built. It is worth noting that while trusting the signer to not re-use the
state is a strong assumption, other signature schemes like ECDSA introduce
similar assumptions for the verifier, by requiring the signer to never re-use
the nonce.</t>
    </section>
    <section anchor="pot-sol">
      <name>Potential Solutions</name>
      <t>A variety of potential solutions have been proposed both within the
<xref target="SP-800-208"/> specification, as well as from external sources. This section
describes a number of approaches and their potential advantages/disadvantages.</t>
      <section anchor="multiple-public-keys-sp-800-208">
        <name>Multiple Public Keys (SP-800-208)</name>
        <t><xref target="SP-800-208"/> proposes generating multiple Stateful HBS keypairs and
configuring devices and clients to accept signatures created by any of these
keys. Secondary Stateful HBS keys can be kept in storage until the first keypair
is exhausted or lost.</t>
        <t>Accepting multiple public keys negatively impacts one of the advantages of using
Stateful HBS by increasing the public key footprint within the client, which can
be problematic if it has limited public key storage capacity. (Though public
keys are typically equivalently sized to ECDSA rather than larger classical RSA
keys often currently found.) <xref target="SP-800-208"/> addresses storage capacity concerns
by suggesting using a mechanism such as that proposed in <xref target="RFC8649"/> to update
the stored public key by having the current key endorse the next key that is to
be installed. Unfortunately, for many constrained devices the public key is
embedded in immutable ROM or fuses due to security reasons, so it cannot be
updated in this manner.</t>
        <t>The proposal of using multiple Stateful HBS keypairs for a single instance also
generates questions as to how to establish that approach in existing public key
infrastructures. For example, issuing multiple certificates adds the storage
needs of the certificate material to the public key footprint. In order to
alternatively issue multiple public keys encoded inside a single certificate
one would need a standardized format if interoperability is a concern.</t>
      </section>
      <section anchor="nist-dist-multi-tree">
        <name>Distributed Multi-trees (SP-800-208)</name>
        <t><xref target="SP-800-208"/> also proposes creating multiple Stateful HBS keys across multiple
cryptographic modules using a distributed multi-tree approach that is a variant
of the standard hyper-tree based Stateful HBS schemes HSS and XMSS<sup>MT</sup>. In
this approach, trees are instantiated on a root device (HSM<sub>root</sub>), as
well as one or more subordinate devices (HSM<sub>sub{{i}}</sub>), and the root
tree is used to sign the root nodes of the subordinate trees to synthesize a
multi-level Stateful HBS key. The root device is only ever used to sign subordinate
device root nodes, while the subordinate device(s) is(are) used to sign
messages. This is relatively straightforward to do using HSS, and <xref target="SP-800-208"/>
describes the necessary algorithmic modifications when using XMSS<sup>MT</sup>.</t>
        <t>One drawback of this approach is the increased signature size as an additional
OTS needs to be generated, effectively doubling the overall signature size.
Another concern is the single point of failure nature of relying on the root
tree module to sign all of the subordinate trees; if the root tree device fails
then no new subordinate trees can be signed. <xref target="SP-800-208"/> suggested that as
many subordinate trees as possible be generated during the initial root key
generation and subordinate-signing procedure. Unfortunately, this can incur a
large capital expenditure to procure all of the necessary devices, many of
which may not be used for a long period of time, if at all. The subordinate
tree root node signing process must also be carefully managed to ensure top
level trees are only ever used to sign the root nodes of trusted/approved
subordinate trees to ensure that no malicious signing request is accepted,
which would effectively give a rogue entity the ability to generate valid
signatures, thereby undermining the security of the entire system.</t>
        <t><xref target="SP-800-208"/> also suggests combining distributed multi-trees with multiple
root public keys as a means to mitigate some of the concerns regarding having a
single point of failure in the root tree. However, even if a system operator
does everything right, use cases with exceptionally long lifetimes of 10-20+
years (e.g., automotive and aerospace/satellite applications) will require
system operators to rely on devices well beyond their expected lifetimes of
5-10 years, which may constitute an unacceptable business risk.</t>
      </section>
      <section anchor="sectorization">
        <name>Sectorization</name>
        <t>Distributed multi-trees attempt to partition a Stateful HBS signing space
amongst multiple cryptographic modules by breaking up the signing space along
the boundaries of the subordinate trees generated during the multi-tree key
generation process. An alternative approach would be to use only a single tree,
and partition its signature space along some power-of-2 less than the total
number of leaves in the tree (e.g., 2<sup>s</sup> for a tree of height h &gt; s),
creating N = 2<sup>h-s</sup> partitions or sectors, which are instantiated as N
height-s Merkle trees whose root nodes are considered interior nodes of the
overall height-h Merkle tree. Hence, there is no additional OTS required to sign
their root nodes; their values are used as-is in the tree ascent mechanism of
the underlying Stateful HBS scheme, yielding a common public key (i.e., root
node) for all sectors. Care must be taken to ensure that each sector uses the
same root tree identifier (i.e., the "I" value for HSS/LMS and "root" value for
XMSS/XMSS<sup>MT</sup>).</t>
        <t>Each of the N sectors' OTS private key values can be generated pseudo-randomly
from a unique seed value generated from an appropriate source of randomness. The
private keys from different sectors are independent when generated by this
process. This requires that the path information for the root node of each
sector (i.e., all off-path nodes between the sector root node and the top level
node value) be stored with each sector's private key at key generation time
since a sector will not know the seed information required to compute any of the
other sectors' root nodes during the tree ascent phase of a signature generation
operation. During signature generation the signer appends the stored path
information to the path information it computes to ascend from the leaf OTS to
the sector's root node (which it can compute given that it knows its own seed
value).</t>
        <t>Hence, sectorized key generation results in a single public key value and
2<sup>h-s</sup> private key values, each capable of generating 2<sup>s</sup>
signatures, after which the sectorized key is exhausted.</t>
        <t>In addition to avoiding an increased signature size; when unique seeds are
utilized sectorization breaks a given Stateful HBS key/state into multiple independent
fragments that can be managed as independent objects. As a result, system
operators may distribute sectors to multiple cryptographic devices, providing
scalability through parallelization and improved resiliency/availability. This
approach offers isolation between sectors, ensuring that a compromise in one
does not extend to others, thereby supporting damage containment. At the same
time, it simplifies operational robustness by removing the need for
cross-device state coordination, since each sector is restricted to its own
signature space.</t>
      </section>
      <section anchor="keystate-transfer">
        <name>Key/State Transfer</name>
        <t>Stateful HBS key/state transfer between cryptographic modules entails having a means
to migrate one instance of a Stateful HBS key/state on a source device to a separate
destination device, while ensuring that any copy of the key/state is deleted
from the source device.</t>
        <t>This capability may help alleviate the aforementioned concern regarding
operating devices beyond their expected lifetimes by allowing operators to
migrate Stateful HBS key/state to a newer device when the original device begins to
approach its end-of-life. However, it still leaves the operator vulnerable to
having the source device fail before the key/state can be transferred,
effectively causing the loss of the key/state. Hence, it will not be of much
help addressing the single point of failure issue identified for root trees,
but may be useful for managing subordinate trees.</t>
        <t>In addition to complete key/state transfer, a device holding part of the total
available OTS signatures may transfer some unused capacity to another device
(partial state transfer). In more advanced deployments, state fragments from
two devices may be merged to reconstruct or continue signature operations.
These operations carry risk: ensuring no overlap in used indices, ensuring
atomicity of transfer/merge operations, managing consistency, possible
conflicts, and durability of state across devices. Such approaches require
robust synchronization, auditability, and appropriate backup mechanisms to
avoid double-signing or loss of capacity.</t>
        <t>A more elaborate variant of key transfer, going beyond what <xref target="SP-800-208"/>
allows, can be found described in <xref target="alt-backup-mgmt"/> where key transfer is
accomplished using a two-step export and import process with hash-based
transfer validation to yield a more robust transfer mechanism.</t>
      </section>
      <section anchor="key-rotation">
        <name>Key Rotation</name>
        <t>Key rotation, such as that defined in <xref target="RFC8649"/>, would generate new Stateful HBS
keys on an as-needed basis, and provide a means to transition the system on to
using this new Stateful HBS key, while generating the next key in the chain in
preparation of a future rotation/update. However, this just shifts the problem
to the PKI and certificate handling.</t>
        <t>Key rotation is not foolproof since in most use cases it will require
redundancy to ensure there is at least one Stateful HBS signing key available to
attest to newly generated keys. In addition, for many applications the device
keys cannot be updated due to engineering constraints or security reasons.</t>
      </section>
      <section anchor="variable-length-signature-chains">
        <name>Variable-length Signature Chains</name>
        <t>A variant of the key rotation approach is to have an available signing
tree endorse a new subordinate tree when it is about to become exhausted (e.g.,
use its final OTS to sign the root node of a new subordinate tree, creating a
{n+1}-layer multi-tree from an {n}-layer multi-tree). This process can in
theory be repeated as many times as necessary. However, this entails having a
multi-tree scheme with a variable number of levels, and hence, variable length
signatures. Such dynamically extensible constructions are research-class and
are not currently standardized or deployed.</t>
        <t>In addition to departing quite significantly from the current Stateful HBS
specifications and <xref target="SP-800-208"/>, this approach has a number of significant
challenges on both the engineering and operational fronts. Firstly, the
variable length nature of the signature can lead to variable length
verification of signatures, which may cause significant issues for use cases
with strict time constraints (e.g., secure booting of a semiconductor device).
From an operational perspective, the ability of a subordinate tree to sign
either messages or new subordinate trees leads to severe security implications
as the rigor around authorizing those two types of operations will vary
dramatically, leading to either a much more onerous message signing operation,
or a much more risky subordinate tree signing operation. This may put the
system operator in an untenable situation where no users are satisfied with the
resulting solution, and hence, should not be considered as a viable solution.</t>
      </section>
      <section anchor="pre-assigning-states">
        <name>Pre-assigning States</name>
        <t>In some applications, individual one-time signatures (or states) can be
pre-assigned to the to-be-signed objects. This may for example be possible if
the signed objects are monotonically increasingly numbered. One example of such
a use case may be software signing. This solution basically externalizes the
state management to the to-be signed messages.</t>
        <t>Expanding on the given example, for software that is released with strictly
increasing, simple single-position version numbers (i.e., versions 1, 2, 3...),
this can be trivially implemented. As versions have a one-to-one correspondence
to a Stateful HBS signing state, operators must ensure that versions can only be
minted a single time. This may require skipping version numbers if a release
process failed, to avoid double-signing.</t>
        <t>This scheme can be adapted to more complicated release schemes: for example,
minor update-releases 1.0 to 1.99 can be accommodated by assigning signatures
1-100 for these version numbers, while release 2.0-2.99 would get signatures
101-200. The assignments must be fixed as the scheme is set up, and operators
should take into account that they are strictly limiting the number of update
releases. In the described solution to state management, one must move up a
major release number after 99 minor releases, even if this would break, e.g.,
semantic versioning conventions.</t>
        <t>A variant of pre-assigning signatures is doing this on the basis of time, which
we describe in the next section.</t>
      </section>
      <section anchor="time-based-state-management">
        <name>Time-based State Management</name>
        <t>As a variant of pre-assigning one-time signatures based on external counters,
it is in theory possible to base the selection of one-time signature indexes on
the current date and time. For example, if a given Stateful HBS instance offers 1024
total signatures, they could be broken up into 8 groups of 128 OTS instances
each, with the first 128 allowed to be used in the first time window, the
second 128 in the second time window, and so on, until the signature space is
effectively exhausted after 8 time windows. Note that a time-based approach to
state management will "waste" any OTS keys that are unused in past time
windows. One must not attempt to use these keys after the time window has gone
by.</t>
        <t>Any time-based approach has a very strict reliance on accurate time-keeping and
synchronization of clocks. In particular, we identify that at least the
following engineering-related challenges need to be considered:</t>
        <ul spacing="normal">
          <li>
            <t>Signing devices must have accurate timekeeping (which is a very challenging
engineering problem <xref target="TIMEFALSEHOODS"/>).</t>
          </li>
          <li>
            <t>Time on signing devices must not be allowed to ever move backwards, as this
can cause double-signing.</t>
          </li>
          <li>
            <t>Within time windows, signers must track the number of signatures produced to
ensure it does not exceed the number allowed within the window.</t>
          </li>
          <li>
            <t>Signing devices must still operate consistently with the requirements of
state keeping for Stateful HBS: the signature index within a time window should
still appear to be updated atomically, and signatures must not be released
before state changes have been recorded.</t>
          </li>
          <li>
            <t>A system should be robust against exhaustion of the number of signatures
available in a time window, as in this case it is required to wait until the
next time window starts before new messages can be signed.</t>
          </li>
          <li>
            <t>Time on signing devices should not be allowed to be moved forward maliciously
or accidentally, which would allow for a simple denial-of-service attack by
skipping over portions of the signature space.</t>
          </li>
          <li>
            <t>If a signing device needs to be replaced, the replacement device must be set
up with its time in sync with or ahead of the device it is to replace. This
implies the current time on signing devices should be continuously recorded.</t>
          </li>
          <li>
            <t>Rate limiting may need to be considered, as exhausting the available
signatures in a given time window may otherwise be easy.</t>
          </li>
          <li>
            <t>It may be necessary for signers to keep a separate clock for time-based state
management, and one for not necessarily monotonically increasing "wall-time",
e.g., if signed artifacts are expected to be time-stamped with real-world time.</t>
          </li>
        </ul>
        <t>If these concerns can not be sufficiently addressed, time-based state
management as described in this paragraph should not be used. Note that this
list of concerns is not exhaustive, and other, unmentioned, concerns may also
be relevant to the security of a time-based solution.</t>
        <t>Time-based systems can be backed up by simply recording the private keys and
the configuration of the time windows. In case of loss of a signing device, a
time-based state management system can be recovered by using this information
to bring online a new device in the next time window. This approach may also be
used as a recovery mechanism in the case of (suspected) state consistency
problems during a time window. However, the operator must not allow new
signatures to be produced before the new time window starts, unless they know
the exact state at which the previous device became unavailable and are able to
set up the new device accordingly. Waiting until the start of the next time
window avoids double signing, as the OTS keys assigned to future time windows
are guaranteed to have not yet been used. However, this might incur significant
downtime of the signing systems. Downtime may be avoided by forcibly moving the
signing device to the next time window by incrementing its clock; however, this
induced clock drift will then need to be accounted for in the future. If clock
drift is to be avoided, this approach should account for availability
considerations.</t>
      </section>
      <section anchor="interval-based-approaches">
        <name>Interval-based Approaches</name>
        <t>The State Reservation Strategy described in section 5 of <xref target="MCGREW"/> provides
another means of managing the state by allowing users to reserve intervals of
the signing space, marking the interval's associated OTS keys as being used in
the overall HBS state, which is then written back to non-volatile memory prior
to their usage. The OTS keys within the reservation interval are then consumed
as-needed, without having to update the state again until they have all been
consumed and additional OTS keys are required. Note that the reserved OTS keys
are kept in dynamic memory so they will be lost if the signing device loses
power or is reset, resulting in a reduction in the number of usable signatures
for a given HBS instantiation.</t>
        <t>Over provisioning can be used to ensure a sufficient number of signatures can
be provided in the presence of unexpected losses due to power loss or resets.
Over provisioning will cause a minor increase between 2% and 12% on signature
length as the MTS validation paths increase to accommodate the increased Merkle
tree height. However, reservation eliminates the need to update the state
after each OTS key is used, minimizing the likelihood of state reuse due to
state update failures and coherency issues.</t>
        <t>Multiple signing devices can in theory utilize reservation intervals to
carve out portions of signing space so that a single S-HBS key can be shared
amongst multiple devices, leading to potential performance and
disaster-recovery benefits. However, great care must be taken to manage the
reservations to ensure there is no overlap or repeated reservation of a
given interval, either in part or in whole.</t>
      </section>
    </section>
    <section anchor="alt-backup-mgmt">
      <name>Backup Management Beyond NIST SP-800-208</name>
      <t>In this section, an alternative backup mechanism for Stateful HBS is presented in a
generic form, which makes the strategy applicable for both multi-tree instances
XMSS<sup>MT</sup> and HSS.  However, following the same arguments as in
<xref target="sectorization"/>, with minor modifications, the presented strategy is also
applicable for single-tree instances such as XMSS and LMS.</t>
      <t>The strategy presented in this section builds upon the multi-tree variant
approach from <xref target="SP-800-208"/>, and aims to mitigate its limitations described in
<xref target="nist-dist-multi-tree"/>.  Thus, it is assumed that already a top-level Merkle
tree (for signing the root-nodes of sub-trees) and several bottom-level Merkle
trees (for signing messages) are initiated.  These bottom-level trees may be
implemented on different hardware modules in order to obtain redundancy and
improve availability.  Let R be the number of these already initiated
bottom-level trees.  Let h<sub>0</sub> be the height of the top-level-tree.  It
is assumed that R + 1 is strictly smaller than 2<sup>h<sub>0</sub></sup>, the
number of leaves of the top-level tree.</t>
      <t>In this new strategy, after the completed key generation procedure from the
multi-tree variant approach from <xref target="SP-800-208"/>, further bottom-level trees are
generated, one by one, in one of the hardware modules.  These new  bottom-level
trees are each generated from a different seed, which is chosen uniformly at
random.  For the sake of clarity, let us introduce some notation:</t>
      <ul spacing="normal">
        <li>
          <t>S denotes the number of these newly generated bottom-level trees.  Note that
at most 2<sup>h<sub>0</sub></sup> - R new bottom-level trees can be
generated, i.e. S is lower or equal to 2<sup>h<sub>0</sub></sup> - R.  In the
following we suppose that S is <em>strictly smaller</em> than
2<sup>h<sub>0</sub></sup> - R.</t>
        </li>
        <li>
          <t>I<sub>new</sub> denotes the set of indices that belong to these newly
generated bottom-level trees, i.e. I<sub>new</sub> = {R, R+1, ..., R+S-1}.
I<sub>new</sub> is zero-indexed here.</t>
        </li>
      </ul>
      <t>For each new bottom-level tree, after it has been generated, the following
steps must be performed:</t>
      <ul spacing="normal">
        <li>
          <t>sign the corresponding root node with an unused OTS key from the top-level
tree,</t>
        </li>
        <li>
          <t>securely <em>key export</em> (as described in <xref target="keymovement"/>) the seed, which was
used to generate the bottom-level tree,</t>
        </li>
        <li>
          <t>export the signature of the root node, the corresponding OTS key index and
finally the hash of the seed, using appropriate domain separation (i.e.
ensuring there is no domain overlap with the hashes in the Stateful HBS scheme, and
the hash of the seed includes the public key and leaf index to mitigate
multi-target attacks),</t>
        </li>
        <li>
          <t>irreversibly delete the seed and the bottom-level tree from the hardware
module.</t>
        </li>
      </ul>
      <t>The newly generated bottom-level trees (i.e. those bottom-level trees, whose
indices belong to I<sub>new</sub>) are only used in order to guarantee
availability in the <em>worst-case scenario</em>, where at the same time both</t>
      <ul spacing="normal">
        <li>
          <t>none of the R bottom-level Merkle trees (which were generated according to
the multi-tree variant approach from <xref target="SP-800-208"/>) are available for signing
messages and</t>
        </li>
        <li>
          <t>the top-level Merkle tree (which is used for signing the root-nodes of
sub-trees) is also not available anymore.</t>
        </li>
      </ul>
      <t>This scenario may, for example, happen if all hardware modules are broken at
the same time.</t>
      <t>As soon as this worst-case scenario occurs, the newly generated bottom-level
trees (i.e. those bottom-level trees, whose indices belong to I<sub>new</sub>)
need to be initiated in order to ensure availability. In order to do this the
following steps must be performed:</t>
      <ul spacing="normal">
        <li>
          <t>initiate a new hardware module</t>
        </li>
        <li>
          <t>securely <em>key import</em> (as decribed in <xref target="keymovement"/>) the first unused seed
into this hardware module</t>
        </li>
        <li>
          <t>generate the bottom-level tree corresponding to the seed</t>
        </li>
        <li>
          <t>irreversibly delete the seed from the backup medium</t>
        </li>
        <li>
          <t>perform a correctness check by letting the hardware module output the hash of
the seed</t>
        </li>
      </ul>
      <t>Now this bottom-level tree can be used to sign messages. As soon as no more OTS
on the bottom-level tree are available or as soon as the hardware module is
broken, the above steps with a new seed from the backup medium can be repeated.</t>
      <t>Note that the resulting signatures generated from these backed up seeds do not
require any special processing on the verifier side. The signature stored
alongside the backed up seed, and the signature generated from the bottom-level
trees created from the backed up seed can be combined to match the format of a
signature over the complete tree.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations are given throughout this document. Further security
considerations, which are not already covered in this document, are given in
<xref target="SP-800-208"/>, <xref target="MCGREW"/>, <xref target="FIPS205"/>, <xref target="RFC8391"/> and <xref target="RFC8554"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9802">
        <front>
          <title>Use of the HSS and XMSS Hash-Based Signature Algorithms in Internet X.509 Public Key Infrastructure</title>
          <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
          <author fullname="K. Bashiri" initials="K." surname="Bashiri"/>
          <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
          <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
          <author fullname="S. Kousidis" initials="S." surname="Kousidis"/>
          <date month="June" year="2025"/>
          <abstract>
            <t>This document specifies algorithm identifiers and ASN.1 encoding formats for the following stateful Hash-Based Signature (HBS) schemes: Hierarchical Signature System (HSS), eXtended Merkle Signature Scheme (XMSS), and XMSS^MT (a multi-tree variant of XMSS). This specification applies to the Internet X.509 Public Key Infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9802"/>
        <seriesInfo name="DOI" value="10.17487/RFC9802"/>
      </reference>
      <reference anchor="I-D.draft-ietf-suit-mti">
        <front>
          <title>Cryptographic Algorithms for Internet of Things (IoT) Devices</title>
          <author fullname="Brendan Moran" initials="B." surname="Moran">
            <organization>Arm Limited</organization>
          </author>
          <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
            <organization>Nordic Semiconductor</organization>
          </author>
          <author fullname="Akira Tsukamoto" initials="A." surname="Tsukamoto">
            <organization>Openchip &amp; Software Technologies, S.L.</organization>
          </author>
          <date day="22" month="July" year="2025"/>
          <abstract>
            <t>   The SUIT manifest, as defined in "A Manifest Information Model for
   Firmware Updates in Internet of Things (IoT) Devices" (RFC 9124),
   provides a flexible and extensible format for describing how firmware
   and software updates are to be fetched, verified, decrypted, and
   installed on resource-constrained devices.  To ensure the security of
   these update processes, the manifest relies on cryptographic
   algorithms for functions such as digital signature verification,
   integrity checking, and confidentiality.

   This document defines cryptographic algorithm profiles for use with
   the Software Updates for Internet of Things (SUIT) manifest.  These
   profiles specify sets of algorithms to promote interoperability
   across implementations.

   Given the diversity of IoT deployments and the evolving cryptographic
   landscape, algorithm agility is essential.  This document groups
   algorithms into named profiles to accommodate varying levels of
   device capabilities and security requirements.  These profiles
   support the use cases laid out in the SUIT architecture, published in
   "A Firmware Update Architecture for Internet of Things" (RFC 9019).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-suit-mti-23"/>
      </reference>
      <reference anchor="CNSA2.0" target="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF">
        <front>
          <title>Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) Cybersecurity Advisory (CSA)</title>
          <author initials="" surname="National Security Agency (NSA)">
            <organization/>
          </author>
          <date year="2022" month="September" day="07"/>
        </front>
      </reference>
      <reference anchor="MCGREW" target="https://eprint.iacr.org/2016/357.pdf">
        <front>
          <title>State Management for Hash-Based Signatures</title>
          <author initials="D." surname="McGrew">
            <organization/>
          </author>
          <author initials="P." surname="Kampanakis">
            <organization/>
          </author>
          <author initials="S." surname="Fluhrer">
            <organization/>
          </author>
          <author initials="S." surname="Gazdag">
            <organization/>
          </author>
          <author initials="D." surname="Butin">
            <organization/>
          </author>
          <author initials="J." surname="Buchmann">
            <organization/>
          </author>
          <date year="2016" month="November" day="02"/>
        </front>
        <seriesInfo name="Security Standardization Research 2016" value=""/>
      </reference>
      <reference anchor="SP-800-208" target="https://doi.org/10.6028/NIST.SP.800-208">
        <front>
          <title>NIST SP 800-208: Recommendation for Stateful Hash-Based Signature Schemes</title>
          <author initials="D." surname="Cooper" fullname="David Cooper">
            <organization/>
          </author>
          <author initials="D." surname="Apon" fullname="David Apon">
            <organization/>
          </author>
          <author initials="Q." surname="Dang" fullname="Quynh Dang">
            <organization/>
          </author>
          <author initials="M." surname="Davidson" fullname="Michael Davidson">
            <organization/>
          </author>
          <author initials="M." surname="Dworkin" fullname="Morris Dworkin">
            <organization/>
          </author>
          <author initials="C." surname="Miller" fullname="Carl Miller">
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
        <seriesInfo name="NIST Special Publication" value=""/>
      </reference>
      <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
        <front>
          <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
          <author initials="" surname="National Institute of Standards and Technology">
            <organization/>
          </author>
          <date year="2024" month="August" day="13"/>
        </front>
        <seriesInfo name="Federal Information Processing Standards" value=""/>
      </reference>
      <reference anchor="FIPS205" target="https://doi.org/10.6028/NIST.FIPS.205">
        <front>
          <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
          <author initials="" surname="National Institute of Standards and Technology">
            <organization/>
          </author>
          <date year="2024" month="August" day="13"/>
        </front>
        <seriesInfo name="Federal Information Processing Standards" value=""/>
      </reference>
      <reference anchor="BH16" target="https://eprint.iacr.org/2016/1042.pdf">
        <front>
          <title>Oops, I did it again – Security of One-Time Signatures under Two-Message Attacks.</title>
          <author initials="L." surname="Bruinderink">
            <organization/>
          </author>
          <author initials="A." surname="Hülsing">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Fluhrer23">
        <front>
          <title>Oops, I did it again revisited; another look at reusing one-time signatures</title>
          <author initials="S." surname="Fluhrer" fullname="Scott Fluhrer">
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="ETSI-TR-103-692" target="https://www.etsi.org/deliver/etsi_tr/103600_103699/103692/01.01.01_60/tr_103692v010101p.pdf">
        <front>
          <title>State management for stateful authentication mechanisms</title>
          <author initials="" surname="European Telecommunications Standards Institute (ETSI)">
            <organization/>
          </author>
          <date year="2021" month="November"/>
        </front>
      </reference>
      <reference anchor="BSW16" target="https://link.springer.com/chapter/10.1007/978-3-662-49896-5_28">
        <front>
          <title>New Negative Results on Differing-Inputs Obfuscation</title>
          <author initials="M." surname="Bellare">
            <organization/>
          </author>
          <author initials="I." surname="Stepanovss">
            <organization/>
          </author>
          <author initials="B." surname="Waters">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="HBSX509" target="https://www.ietf.org/archive/id/draft-gazdag-x509-hash-sigs-02.html">
        <front>
          <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for Hash-based Signatures</title>
          <author initials="K." surname="Bashiri">
            <organization/>
          </author>
          <author initials="S." surname="Fluhrer">
            <organization/>
          </author>
          <author initials="S." surname="Gazdag">
            <organization/>
          </author>
          <author initials="D." surname="Van Geest">
            <organization/>
          </author>
          <author initials="S." surname="Kousidis">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="TIMEFALSEHOODS" target="https://gist.github.com/timvisee/fcda9bbdff88d45cc9061606b4b923ca">
        <front>
          <title>Falsehoods programmers believe about time</title>
          <author initials="T." surname="Visée">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="RFC8391">
        <front>
          <title>XMSS: eXtended Merkle Signature Scheme</title>
          <author fullname="A. Huelsing" initials="A." surname="Huelsing"/>
          <author fullname="D. Butin" initials="D." surname="Butin"/>
          <author fullname="S. Gazdag" initials="S." surname="Gazdag"/>
          <author fullname="J. Rijneveld" initials="J." surname="Rijneveld"/>
          <author fullname="A. Mohaisen" initials="A." surname="Mohaisen"/>
          <date month="May" year="2018"/>
          <abstract>
            <t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature. This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS. Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems. Instead, it is proven that it only relies on the properties of cryptographic hash functions. XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken. It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8391"/>
        <seriesInfo name="DOI" value="10.17487/RFC8391"/>
      </reference>
      <reference anchor="RFC8554">
        <front>
          <title>Leighton-Micali Hash-Based Signatures</title>
          <author fullname="D. McGrew" initials="D." surname="McGrew"/>
          <author fullname="M. Curcio" initials="M." surname="Curcio"/>
          <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
            <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8554"/>
        <seriesInfo name="DOI" value="10.17487/RFC8554"/>
      </reference>
      <reference anchor="RFC9162">
        <front>
          <title>Certificate Transparency Version 2.0</title>
          <author fullname="B. Laurie" initials="B." surname="Laurie"/>
          <author fullname="E. Messeri" initials="E." surname="Messeri"/>
          <author fullname="R. Stradling" initials="R." surname="Stradling"/>
          <date month="December" year="2021"/>
          <abstract>
            <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
            <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
            <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9162"/>
        <seriesInfo name="DOI" value="10.17487/RFC9162"/>
      </reference>
      <reference anchor="RFC8649">
        <front>
          <title>Hash Of Root Key Certificate Extension</title>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <date month="August" year="2019"/>
          <abstract>
            <t>This document specifies the Hash Of Root Key certificate extension. This certificate extension is carried in the self-signed certificate for a trust anchor, which is often called a Root Certification Authority (CA) certificate. This certificate extension unambiguously identifies the next public key that will be used at some point in the future as the next Root CA certificate, eventually replacing the current one.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8649"/>
        <seriesInfo name="DOI" value="10.17487/RFC8649"/>
      </reference>
      <reference anchor="RFC8411">
        <front>
          <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <author fullname="R. Andrews" initials="R." surname="Andrews"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8411"/>
        <seriesInfo name="DOI" value="10.17487/RFC8411"/>
      </reference>
    </references>
    <?line 928?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was inspired by discussions at the 2nd Oxford Post-Quantum
Cryptography Summit 2023.</t>
      <t>We gratefully acknowledge Melissa Azouaoui for her input to this document.</t>
      <t>The abstract and the introduction are based on the introduction in <xref target="HBSX509"/>.
Thanks go to the authors of this document. "Copying always makes things easier
and less error-prone" - <xref target="RFC8411"/>.</t>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <ul spacing="normal">
        <li>
          <t>Jeff Andersen (Google)</t>
        </li>
        <li>
          <t>Bruno Couillard (Crypto4A Technologies)</t>
        </li>
        <li>
          <t>Stefan-Lukas Gazdag (genua GmbH)</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
