<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-ecdhe-mlkem-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ECDHE-MLKEM">Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ecdhe-mlkem-04"/>
    <author initials="K." surname="Kwiatkowski" fullname="Kris Kwiatkowski">
      <organization>PQShield</organization>
      <address>
        <email>kris@amongbytes.com</email>
      </address>
    </author>
    <author initials="P." surname="Kampanakis" fullname="Panos Kampanakis">
      <organization>AWS</organization>
      <address>
        <email>kpanos@amazon.com</email>
      </address>
    </author>
    <author initials="B. E." surname="Westerbaan" fullname="Bas Westerbaan">
      <organization>Cloudflare</organization>
      <address>
        <email>bas@cloudflare.com</email>
      </address>
    </author>
    <author initials="D." surname="Stebila" fullname="Douglas Stebila">
      <organization>University of Waterloo</organization>
      <address>
        <email>dstebila@waterloo.ca</email>
      </address>
    </author>
    <date year="2026" month="February" day="08"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>ECDH</keyword>
    <keyword>hybrid</keyword>
    <keyword>ML-KEM</keyword>
    <keyword>post-quantum</keyword>
    <keyword>x25519</keyword>
    <abstract>
      <?line 62?>

<t>This draft defines three hybrid key agreement mechanisms for TLS 1.3 - X25519MLKEM768,
SecP256r1MLKEM768, and SecP384r1MLKEM1024 - that combine the post-quantum ML-KEM
(Module-Lattice-Based Key Encapsulation Mechanism) with an ECDHE
(Elliptic Curve Diffie-Hellman) exchange.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/draft-ietf-tls-ecdhe-mlkem/draft-ietf-tls-ecdhe-mlkem.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/draft-ietf-tls-ecdhe-mlkem"/>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>ML-KEM is a key encapsulation mechanism (KEM) defined in the <xref target="NIST-FIPS-203"/>. It is designed to
withstand cryptanalytic attacks from quantum computers.</t>
      <t>The <xref target="hybrid"/> document defines a framework for combining traditional key exchanges with next-generation key
exchange in TLS 1.3. The goal of this approach is to provide security against both classical and quantum
adversaries while maintaining compatibility with existing infrastructure and protocols.</t>
      <t>This document applies the framework to ML-KEM
and specifies code points for the hybrid groups.</t>
    </section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>This document introduces three new supported groups for hybrid post-quantum key agreements in TLS 1.3: the X25519MLKEM768,
SecP256r1MLKEM768, and SecP384r1MLKEM1024 which combine ML-KEM with ECDH in the manner of <xref target="hybrid"/>. Any of the hybrid groups
specified in this document may be implemented in a FIPS-approved way as discussed in <xref target="regulatory-context"/>.</t>
      <ul spacing="normal">
        <li>
          <t>The first one uses X25519 <xref target="RFC7748"/>, is widely deployed, and often serves as the most practical choice for a single post-quantum/traditional (PQ/T) hybrid combiner <xref target="RFC9794"/> in TLS 1.3.</t>
        </li>
        <li>
          <t>The second group uses secp256r1 (NIST P-256) <xref target="NIST-FIPS-186"/>. This group supports use cases that require both shared secrets to be generated by FIPS-approved mechanisms.</t>
        </li>
        <li>
          <t>The third group uses secp384r1 (NIST P-384) <xref target="NIST-FIPS-186"/>. This group is intended for high-security environments that require FIPS-approved mechanisms with an increased security margin.</t>
        </li>
      </ul>
      <t>Key establishment using NIST curves is outlined in Section 6.1.1.2 of <xref target="NIST-SP-800-56A"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The <xref target="hybrid"/> document defines "traditional" algorithms as those that are already widely adopted and "next-generation" algorithms
as those that are not yet widely adopted, such as post-quantum algorithms. In this document, ECDH using Curve25519, P-256, or
P-384 is considered traditional, while ML-KEM is considered next-generation.</t>
        <t>The <xref target="hybrid"/> document also defines a "hybrid" key exchange as the simultaneous use of multiple key exchange algorithms, with their
outputs combined to provide security as long as at least one of the component algorithms remains secure, even if the others are
compromised. This document uses the term "hybrid" with the same meaning.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="negotiated-groups">
      <name>Negotiated Groups</name>
      <section anchor="client-share">
        <name>Client share</name>
        <t>When the X25519MLKEM768 group is negotiated, the client's key_exchange value
is the concatenation of the client's ML-KEM-768 encapsulation key
and the client's X25519 ephemeral share.
The size of the client share is 1216 bytes (1184 bytes for the ML-KEM part and 32 bytes for X25519).</t>
        <t>Note: The group name X25519MLKEM768 does not adhere to the naming convention outlined in
<xref section="3.2" sectionFormat="of" target="hybrid"/>. Specifically, the order of shares in the concatenation has been
reversed. This is due to historical reasons.</t>
        <t>When the SecP256r1MLKEM768 group is negotiated, the client's key_exchange value
is the concatenation of the secp256r1 ephemeral share and ML-KEM-768 encapsulation key.
The ECDHE share is the serialized value of the uncompressed ECDH point representation as
defined  in <xref section="4.2.8.2" sectionFormat="of" target="RFC8446"/>. The size of the client share is 1249 bytes
(65 bytes for the secp256r1 part and 1184 bytes for ML-KEM).</t>
        <t>When the SecP384r1MLKEM1024 group is negotiated, the client's key_exchange value
is the concatenation of the secp384r1 ephemeral share and the ML-KEM-1024
encapsulation key. The ECDH share is serialized value of the uncompressed ECDH point
represenation as defined in <xref section="4.2.8.2" sectionFormat="of" target="RFC8446"/>. The size of the
client share is 1665 bytes (97 bytes for the secp384r1 part and 1568 for ML-KEM).</t>
      </section>
      <section anchor="server-share">
        <name>Server share</name>
        <t>When the X25519MLKEM768 group is negotiated, the server's key exchange
value is the concatenation of an ML-KEM ciphertext returned from encapsulation
to the client's encapsulation key, and the server's ephemeral X25519 share.
The size of the server share is 1120 bytes (1088 bytes for the ML-KEM part and 32 bytes for X25519).</t>
        <t>When the SecP256r1MLKEM768 group is negotiated, the server's key exchange
value is the concatenation of the server's ephemeral secp256r1 share encoded
in the same way as the client share and an ML-KEM ciphertext returned from encapsulation
to the client's encapsulation key. The size of the server share is 1153 bytes (1088 bytes
for the ML-KEM part and 65 bytes for secp256r1).</t>
        <t>When the SecP384r1MLKEM1024 group is negotiated, the server's key exchange
value is the concatenation of the server's ephemeral secp384r1 share
encoded in the same way as the client share and an ML-KEM ciphertext returned
from encapsulation to the client's encapsulation key. The size of the server
share is 1665 bytes (1568 bytes for the ML-KEM part and 97 bytes for
secp384r1)</t>
        <t>For all groups, the server <bcp14>MUST</bcp14> perform the encapsulation key check
described in Section 7.2 of <xref target="NIST-FIPS-203"/> on the client's encapsulation
key, and abort with an illegal_parameter alert if it fails.</t>
        <t>For all groups, the client <bcp14>MUST</bcp14> check if the ciphertext length matches
the selected group, and abort with an illegal_parameter alert if it fails.
If ML-KEM decapsulation fails for any other reason, the connection <bcp14>MUST</bcp14>
be aborted with an internal_error alert.</t>
        <t>For all groups, both client and server <bcp14>MUST</bcp14> process the ECDH part
as described in <xref section="4.2.8.2" sectionFormat="of" target="RFC8446"/>, including all validity checks,
and abort with an illegal_parameter alert if it fails.</t>
      </section>
      <section anchor="shared-secret">
        <name>Shared secret</name>
        <t>For X25519MLKEM768, the shared secret is the concatenation of the ML-KEM
shared secret and the X25519 shared secret. The shared secret is 64 bytes
(32 bytes for each part).</t>
        <t>For SecP256r1MLKEM768, the shared secret is the concatenation of the
ECDHE and ML-KEM shared secret. The ECDHE shared secret is the x-coordinate of the ECDH
shared secret elliptic curve point represented as an octet string as
defined in <xref section="7.4.2" sectionFormat="of" target="RFC8446"/>.
The size of the shared secret is 64 bytes (32 bytes for each part).</t>
        <t>For SecP384r1MLKEM1024, the shared secret is the concatenation of the
ECDHE and ML-KEM shared secret. The ECDHE shared secret is the x-coordinate of the ECDH
shared secret elliptic curve point represented as an octet string as
defined in <xref section="7.4.2" sectionFormat="of" target="RFC8446"/>.
The size of the shared secret is 80 bytes (48 bytes for the ECDH part and
32 bytes for the ML-KEM part).</t>
        <t>For all groups, both client and server <bcp14>MUST</bcp14> calculate the ECDH part of the
shared secret as described in <xref section="7.4.2" sectionFormat="of" target="RFC8446"/>, including the
all-zero shared secret check for X25519, and abort the connection with an
illegal_parameter alert if it fails.</t>
      </section>
    </section>
    <section anchor="regulatory-context">
      <name>Regulatory Context</name>
      <t>This section provides informal notes on how the hybrid key agreement mechanisms defined
in this document relate to existing NIST guidance on key derivation and hybrid
key establishment.</t>
      <ul spacing="normal">
        <li>
          <t><strong>FIPS-compliance</strong>. All groups defined in this document permit FIPS-approved key derivation as per <xref target="NIST-SP-800-56C"/>
and <xref target="NIST-SP-800-135"/>. NIST's special publication 800-56Cr2 <xref target="NIST-SP-800-56C"/> approves the
usage of HKDF <xref target="RFC5869"/> with two distinct shared secrets, with the condition that the first
one is computed by a FIPS-approved key-establishment scheme. FIPS also requires a certified
implementation of the scheme, which will remain more ubiquitous for secp256r1 in the coming years. For this reason,
the ML-KEM shared secret is placed first in X25519MLKEM768, while the ECDH shared secret is placed first
in SecP256r1MLKEM768 and SecP384r1MLKEM1024. This means that for SecP256r1MLKEM768 and SecP384r1MLKEM1024,
the ECDH implementation must be certified whereas the ML-KEM implementation does not require certification. In
contrast, for X25519MLKEM768, the ML-KEM implementation must be certified.</t>
        </li>
        <li>
          <t><strong>SP800-227 compliance</strong>. The NIST Special Publication 800-227 <xref target="NIST-SP-800-227"/> provides general guidance on the design and use of key-encapsulation mechanisms, including hybrid constructions. The key agreements defined in this document follow the principles described in Section 4.6 of <xref target="NIST-SP-800-227"/>, which discusses the combination of post-quantum and classical key-establishment schemes and the use of approved key combiners. In particular, the shared-secret concatenation and HKDF-based derivation used by the TLS 1.3 are consistent with the composite-KEM constructions and key-combiner recommendations outlined in Sections 4.6.1 and 4.6.2 of <xref target="NIST-SP-800-227"/>. Section 4.6.3 of <xref target="NIST-SP-800-227"/> further provides relevant security considerations for hybrid KEM designs underlying the approach used in this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The same security considerations as those described in <xref target="hybrid"/> apply to the approach used by this document.
The security analysis relies crucially on the TLS 1.3 message transcript, and one cannot assume a similar
hybridisation is secure in other protocols.</t>
      <t><xref target="NIST-SP-800-227"/> includes guidelines and requirements for implementations on using KEMs securely. Implementers are encouraged to use implementations resistant to side-channel attacks,
especially those that can be applied by remote attackers.</t>
      <t>All groups defined in this document use and generate fixed-length public keys, ciphertexts,
and shared secrets, which complies with the requirements described in <xref section="6" sectionFormat="of" target="hybrid"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests/registers three new entries to the <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref>, according to the procedures in <xref section="6" sectionFormat="of" target="RFC9847"/>. These identifiers are to be used with the final,
ratified by NIST, version of ML-KEM which is specified in <xref target="NIST-FIPS-203"/>.</t>
      <section anchor="x25519mlkem768">
        <name>X25519MLKEM768</name>
        <dl spacing="compact">
          <dt>Value:</dt>
          <dd>
            <t>4588 (0x11EC)</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>X25519MLKEM768</t>
          </dd>
          <dt>DTLS-OK:</dt>
          <dd>
            <t>Y</t>
          </dd>
          <dt>Recommended:</dt>
          <dd>
            <t>N</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Comment:</dt>
          <dd>
            <t>Combining X25519 ECDH with ML-KEM-768</t>
          </dd>
        </dl>
      </section>
      <section anchor="secp256r1mlkem768">
        <name>SecP256r1MLKEM768</name>
        <dl spacing="compact">
          <dt>Value:</dt>
          <dd>
            <t>4587 (0x11EB)</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>SecP256r1MLKEM768</t>
          </dd>
          <dt>DTLS-OK:</dt>
          <dd>
            <t>Y</t>
          </dd>
          <dt>Recommended:</dt>
          <dd>
            <t>N</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Comment:</dt>
          <dd>
            <t>Combining secp256r1 ECDH with ML-KEM-768</t>
          </dd>
        </dl>
      </section>
      <section anchor="secp384r1mlkem1024">
        <name>SecP384r1MLKEM1024</name>
        <dl spacing="compact">
          <dt>Value:</dt>
          <dd>
            <t>4589 (0x11ED)</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>SecP384r1MLKEM1024</t>
          </dd>
          <dt>DTLS-OK:</dt>
          <dd>
            <t>Y</t>
          </dd>
          <dt>Recommended:</dt>
          <dd>
            <t>N</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Comment:</dt>
          <dd>
            <t>Combining secp384r1 ECDH with ML-KEM-1024</t>
          </dd>
        </dl>
      </section>
      <section anchor="obsoleted-supported-groups">
        <name>Obsoleted Supported Groups</name>
        <t>Experimental code points for pre-standard versions of Kyber768 were added to the TLS registry as X25519Kyber768Draft00 (25497) and SecP256r1Kyber768Draft00 (25498). This document obsoletes these entries. IANA is instructed to modify the recommended field to 'D' and update the reference to add [ this RFC ].  The comment fields for 25497 and 25498 are updated to "Pre-standards version of Kyber768. Obsoleted by [this RFC]"</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="hybrid">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
        <reference anchor="NIST-FIPS-186">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author>
              <organization/>
            </author>
            <date month="February" year="2023"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.186-5"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="NIST-FIPS-203">
          <front>
            <title>Module-lattice-based key-encapsulation mechanism standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="NIST-SP-800-56A">
          <front>
            <title>Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author fullname="Apostol Vassilev" initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author fullname="Richard Davis" initials="R." surname="Davis">
              <organization/>
            </author>
            <date month="April" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-56ar3"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="NIST-SP-800-56C">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Richard Davis" initials="R." surname="Davis">
              <organization/>
            </author>
            <date month="August" year="2020"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-56cr2"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="NIST-SP-800-135">
          <front>
            <title>Recommendation for existing application-specific key derivation functions</title>
            <author fullname="Q H Dang" initials="Q." surname="Dang">
              <organization/>
            </author>
            <date year="2011"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-135r1"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="NIST-SP-800-227">
          <front>
            <title>Recommendations for key-encapsulation mechanisms</title>
            <author fullname="Gorjan Alagic" initials="G." surname="Alagic">
              <organization/>
            </author>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Dustin Moody" initials="D." surname="Moody">
              <organization/>
            </author>
            <author fullname="Angela Robinson" initials="A." surname="Robinson">
              <organization/>
            </author>
            <author fullname="Hamilton Silberg" initials="H." surname="Silberg">
              <organization/>
            </author>
            <author fullname="Noah Waller" initials="N." surname="Waller">
              <organization/>
            </author>
            <date month="September" year="2025"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-227"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="RFC9847">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document updates the changes to the TLS and DTLS IANA registries made in RFC 8447. It adds a new value, "D" for discouraged, to the "Recommended" column of the selected TLS registries and adds a "Comment" column to all active registries that do not already have a "Comment" column. Finally, it updates the registration request instructions.</t>
              <t>This document updates RFC 8447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9847"/>
          <seriesInfo name="DOI" value="10.17487/RFC9847"/>
        </reference>
        <reference anchor="RFC5869">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications. The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
      </references>
    </references>
    <?line 313?>

<section anchor="change-log">
      <name>Change log</name>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-tls-ecdhe-mlkem-04:
          </t>
          <ul spacing="normal">
            <li>
              <t>Status: Sets document category to Standards Track</t>
            </li>
            <li>
              <t>References: Make <xref target="hybrid"/> normative; add/clarify HKDF reference via RFC 5869; update to RFC 9847 (replacing draft-ietf-tls-rfc8447bis).</t>
            </li>
            <li>
              <t>Text: Rename “Discussion” to “Regulatory context” and expand it (incl. NIST SP 800-227 notes).</t>
            </li>
            <li>
              <t>IANA/TLS registry: Obsoletes the experimental pre-standard Kyber768 groups X25519Kyber768Draft00 (25497) and SecP256r1Kyber768Draft00 (25498); instruct IANA to set Recommended = “D”, update Reference to this RFC, and update Comments accordingly.</t>
            </li>
            <li>
              <t>Editorial: Addressed nits, including normalizing reference labels to a consistent format (e.g., RFC7748 instead of rfc7748 or ad-hoc labels like HKDF) and renaming NIST references to the NIST-... form.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>draft-ietf-tls-ecdhe-mlkem-01:
          </t>
          <ul spacing="normal">
            <li>
              <t>Alignment with the final version of <xref target="hybrid"/></t>
            </li>
            <li>
              <t>Added new section called Discussion and moved FIPS-compliance and Failures text there.</t>
            </li>
            <li>
              <t>The Construction section has been removed.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>draft-ietf-tls-ecdhe-mlkem-00:
          </t>
          <ul spacing="normal">
            <li>
              <t>Change a name of the draft, following adoption by TLS WG</t>
            </li>
            <li>
              <t>Fixes references to the to NIST ECC CDH</t>
            </li>
          </ul>
        </li>
        <li>
          <t>draft-kwiatkowski-tls-ecdhe-mlkem-03:
          </t>
          <ul spacing="normal">
            <li>
              <t>Adds P-384 combined with ML-KEM-1024</t>
            </li>
            <li>
              <t>Adds text that describes error-handling and outlines how the client and server must ensure the integrity of the key exchange process.</t>
            </li>
            <li>
              <t>Adds note on the incompatibility of the codepoint name X25519MLKEM768 with <xref target="hybrid"/>.</t>
            </li>
            <li>
              <t>Various cosmetic changes.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>draft-kwiatkowski-tls-ecdhe-mlkem-02:
          </t>
          <ul spacing="normal">
            <li>
              <t>Adds section that mentions supported groups that this document obsoletes.</t>
            </li>
            <li>
              <t>Fix a reference to encapsulation in the FIPS 203.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>draft-kwiatkowski-tls-ecdhe-mlkem-01:
          </t>
          <ul spacing="normal">
            <li>
              <t>Add X25519MLKEM768</t>
            </li>
          </ul>
        </li>
        <li>
          <t>draft-kwiatkowski-tls-ecdhe-mlkem-00:
          </t>
          <ul spacing="normal">
            <li>
              <t>Change Kyber name to ML-KEM</t>
            </li>
            <li>
              <t>Swap reference to I-D.cfrg-schwabe-kyber with FIPS-203</t>
            </li>
            <li>
              <t>Change codepoint. New value is equal to old value + 1.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>draft-kwiatkowski-tls-ecdhe-kyber-01: Fix size of key shares generated by the client and the server</t>
        </li>
        <li>
          <t>draft-kwiatkowski-tls-ecdhe-kyber-00: updates following IANA review</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
