<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-cose-jose-pqc-hybrid-hpke-10" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC &amp; PQ/T Hybrid KEMs for HPKE (JOSE/COSE)">Post-Quantum and Hybrid KEMs for HPKE with JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-cose-jose-pqc-hybrid-hpke-10"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2026" month="February" day="11"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>JOSE</keyword>
    <keyword>Hybrid</keyword>
    <keyword>HPKE</keyword>
    <keyword>Post-Quantum</keyword>
    <abstract>
      <?line 65?>

<t>This document specifies the use of Post-Quantum (PQ) and Post-Quantum/Traditional (PQ/T) Hybrid Key Encapsulation Mechanisms (KEMs) within the Hybrid Public Key Encryption (HPKE) for JOSE and COSE. It defines algorithm identifiers and key formats to support pure post-quantum algorithms (ML-KEM) and their PQ/T hybrid combinations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-cose-jose-pqc-hybrid/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        cose Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to Post-Quantum Cryptography (PQC) is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The traditional algorithms, such as RSA and elliptic curve cryptography (ECC), will fall to quantum cryptanalysis, while the post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs.</t>
      <t>During this transition, deployments may adopt different strategies depending on their security posture, risk tolerance, and external constraints. Hybrid key exchange is generally preferred over pure PQC key exchange because it provides defense in depth by combining the strengths of both traditional and post-quantum algorithms. This approach ensures continued security even if one of the component algorithms is compromised during the transitional period.</t>
      <t>However, pure PQC key exchange may be required for specific deployments with regulatory or compliance mandates that necessitate the exclusive use of post-quantum cryptography. Such requirements may arise in environments governed by stringent cryptographic standards that prohibit reliance on traditional public-key algorithms.</t>
      <t>Hybrid Public Key Encryption (HPKE) specifies a scheme for encrypting arbitrary-length plaintexts to a recipient’s public key. The use of HPKE with JOSE and COSE is specified in <xref target="I-D.ietf-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/>, respectively. HPKE can be extended to support both pure PQC and post-quantum/traditional (PQ/T) hybrid Key Encapsulation Mechanisms (KEMs), as defined in <xref target="I-D.ietf-hpke-pq"/>. This document specifies the use of these KEMs in HPKE for JOSE and COSE.</t>
      <t>Supporting both pure PQC and PQ/T hybrid KEMs enables flexible deployment choices: hybrid mechanisms provide a conservative transition strategy with defense in depth, while pure PQC mechanisms accommodate deployments with regulatory, compliance, or policy-driven requirements for exclusive use of PQC.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include ML-KEM.</t>
      <t>"Post-Quantum Traditional (PQ/T) Hybrid Scheme":  A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t>"PQ/T Hybrid Key Encapsulation Mechanism":  A multi-algorithm KEM made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="construction">
      <name>Construction</name>
      <t>ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameter sets for ML-KEMs are specified by <xref target="FIPS203"/>. In order of increasing security strength (and decreasing performance), these parameter sets
are ML-KEM-512, ML-KEM-768, and ML-KEM-1024. For pure PQC, the ML-KEM algorithms are used as standalone KEMs within the HPKE framework as defined in <xref target="I-D.ietf-hpke-pq"/>.</t>
      <t>While this document defines ciphersuites for all three parameter sets, implementers should follow the guidance in Section 3 of <xref target="I-D.ietf-hpke-pq"/> regarding the selection of security levels. Specifically, it is noted that while ML-KEM-512 provides NIST security category 1, the use of ML-KEM-768 or ML-KEM-1024 is generally preferred to provide a higher security margin against potential future cryptanalysis.</t>
      <t>PQ/T algorithms for HPKE <xref target="I-D.ietf-hpke-pq"/> use a multi-algorithm scheme, where one component algorithm is a post-quantum algorithm and another one is a traditional algorithm. The hybrid combiner construction, such as the C2PRICombiner defined in <xref target="I-D.irtf-cfrg-hybrid-kems"/>, combines the shared secrets and public values from a post-quantum KEM and a traditional KEM to derive a single shared secret for HPKE.</t>
    </section>
    <section anchor="alignment-with-jose-hpke-modes">
      <name>Alignment with JOSE HPKE Modes</name>
      <t>The JOSE HPKE specification <xref target="I-D.ietf-jose-hpke-encrypt"/> and the COSE HPKE specification <xref target="I-D.ietf-cose-hpke"/> define the use of HPKE with two Key Management Modes:</t>
      <ul spacing="normal">
        <li>
          <t>Key Encryption, and</t>
        </li>
        <li>
          <t>Integrated Encryption.</t>
        </li>
      </ul>
      <t>In both JOSE and COSE, the selected Key Management Mode determines how HPKE is applied at the message layer. In Key Encryption mode, HPKE is used to encrypt a Content Encryption Key (CEK), which is then used to encrypt the payload. In Integrated Encryption mode, HPKE is used directly to encrypt the payload, and no separate CEK is employed.</t>
      <t>Each Key Management Mode is identified by a distinct algorithm identifier (alg) in both JOSE and COSE. This document registers separate HPKE algorithm identifiers for Key Encryption and Integrated Encryption for both pure PQC and PQ/T hybrid HPKE instantiations.</t>
      <t>This separation ensures that JOSE and COSE implementations can determine the intended HPKE Key Management Mode solely from the alg value, without ambiguity, and preserves compatibility with existing HPKE processing models.</t>
    </section>
    <section anchor="ciphersuite-registration">
      <name>Ciphersuite Registration</name>
      <t>This specification registers a set of pure PQC and PQ/T hybrid KEMs for use with HPKE. In this context, an HPKE ciphersuite is defined as a combination of the following algorithm components:</t>
      <ul spacing="normal">
        <li>
          <t>KEM algorithm, which may be either:
          </t>
          <ul spacing="normal">
            <li>
              <t>a pure PQC KEM (for example, ML-KEM-768), or</t>
            </li>
            <li>
              <t>a PQ/T hybrid KEM that combines a PQC KEM with a traditional
key-exchange algorithm (for example, ML-KEM-768 + X25519, defined as
"MLKEM768-X25519" in <xref target="I-D.ietf-hpke-pq"/>)</t>
            </li>
          </ul>
        </li>
        <li>
          <t>KDF algorithm</t>
        </li>
        <li>
          <t>AEAD algorithm</t>
        </li>
      </ul>
      <t>The values for KEM, KDF, and AEAD are drawn from the HPKE IANA registry <xref target="HPKE-IANA"/>. Consequently, JOSE and COSE can only use algorithm combinations that are already defined and registered for HPKE.</t>
      <t>The HPKE ciphersuites defined for use with JOSE and COSE, including both pure PQC and PQ/T hybrid KEMs, are specified in <xref target="IANA"/>.</t>
      <t>Note that the pure PQC and PQ/T hybrid KEMs defined for HPKE are not authenticated KEMs. As a result, only the HPKE Base mode is supported when using these KEMs, in accordance with the HPKE and JOSE/COSE HPKE specifications.</t>
    </section>
    <section anchor="akp-key-type-for-use-with-pqc-and-pqt-hybrid-hpke-algorithms">
      <name>AKP Key Type for Use with PQC and PQ/T Hybrid HPKE Algorithms</name>
      <t>This section describes the required parameters for an "AKP" key type, as
defined in <xref target="I-D.ietf-cose-dilithium"/>, and its use with pure PQC
and PQ/T hybrid algorithms for HPKE, as defined in {#XWING} and {#XWING-KE}. 
An example key representation is also provided for illustration.</t>
      <section anchor="required-parameters">
        <name>Required Parameters</name>
        <t>A JSON Web Key (JWK) or COSE_Key with a key type (<tt>kty</tt>) for use with pure PQC
or PQ/T hybrid algorithms for HPKE includes the following parameters:</t>
        <ul spacing="normal">
          <li>
            <t>kty (Key Type)<br/>
The <tt>kty</tt> parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> be set to "AKP".</t>
          </li>
          <li>
            <t>alg (Algorithm)<br/>
The <tt>alg</tt> parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> identify the pure PQC or
PQ/T hybrid algorithm for HPKE, as defined in {#XWING} or {#XWING-KE}.<br/>
HPKE algorithms using pure PQC or PQ/T hybrid KEMs are those registered
in the "JSON Web Signature and Encryption Algorithms" registry and the
"COSE Algorithms" registry, and are derived from the corresponding
KEM identifiers in the HPKE IANA registry.</t>
          </li>
          <li>
            <t>pub (Public Key)<br/>
The <tt>pub</tt> parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the public
encapsulation key (<tt>pk</tt>) as defined in Section 5.1 of
<xref target="I-D.irtf-cfrg-hybrid-kems"/>. For hybrid KEMs, the PQC KEM public key 
<bcp14>MUST</bcp14> be placed first, followed immediately by the traditional public key, 
as specified in <xref target="I-D.ietf-hpke-pq"/>. No padding or delimiters are used 
between the keys.  </t>
            <t>
When represented as a JWK, this value <bcp14>MUST</bcp14> be base64url-encoded.</t>
          </li>
          <li>
            <t>priv (Private Key)<br/>
When representing a private key, the <tt>priv</tt> parameter <bcp14>MUST</bcp14> be present
and <bcp14>MUST</bcp14> contain the private decapsulation key (<tt>sk</tt>) as defined in
Section 5.1 of <xref target="I-D.irtf-cfrg-hybrid-kems"/>. For hybrid KEMs, the PQC 
KEM private key <bcp14>MUST</bcp14> be placed first, followed immediately by the traditional private key.<br/>
When represented as a JWK, this value <bcp14>MUST</bcp14> be base64url-encoded.</t>
          </li>
        </ul>
        <section anchor="example">
          <name>Example</name>
          <t>The following is an example JWK representation of an "AKP" key for the "MLKEM768-X25519-SHAKE256-AES-256-GCM" algorithm:</t>
          <artwork><![CDATA[
{
    "kty"  : "AKP", 
    "alg"  : "HPKE-8", 
    "pub"  : "4iNrNajCSz...tmrrIzQSQQO9lNA", 
    "priv" : "f5wrpOiP...rPpm7yY" 
}
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="I-D.ietf-hpke-pq"/>, <xref target="I-D.ietf-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/> are to be taken into account.</t>
      <t>The shared secrets computed in the hybrid key exchange must be computed in a way that achieves the "hybrid" property: the resulting secret is secure as long as at least one of the component key exchange algorithms is unbroken. PQC KEMs used in the manner described in this document <bcp14>MUST</bcp14> explicitly be designed to be secure in the event that the public key is reused, such as achieving IND-CCA2 security.ML-KEM has such security properties.</t>
      <section anchor="post-quantum-security-for-multiple-recipients">
        <name>Post-Quantum Security for Multiple Recipients</name>
        <t>In HPKE JWE Key Encryption, when encrypting the Content Encryption Key (CEK) for multiple recipients, it is crucial to consider the security requirements of the message to safeguard against "Harvest Now, Decrypt Later" attacks. For messages requiring post-quantum security, all recipients <bcp14>MUST</bcp14> use algorithms supporting post-quantum cryptographic methods, such as PQC KEMs or Hybrid PQ/T KEMs. Using traditional algorithms (e.g., ECDH-ES) for any recipient in these scenarios compromises the overall security of the message.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="jose">
        <name>JOSE</name>
        <t>This document requests IANA to add new values to the "JSON Web Signature and Encryption Algorithms" registry.</t>
        <section anchor="XWING">
          <name>JOSE Algorithms for Integrated Encryption</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: HPKE-8</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-9</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-10</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-11</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-12</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-13</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-14</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-512 KEM, the SHAKE256 KDF, and the AES-128-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-15</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-16</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-1024 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
          </ul>
        </section>
        <section anchor="XWING-KE">
          <name>JOSE Algorithms for Key Encryption</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: HPKE-8-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-9-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-10-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-11-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-12-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-13-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-14-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-512 KEM, the SHAKE256 KDF, and the AES-128-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-15-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-16-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-1024 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <t>This document requests IANA to add new values to the 'COSE Algorithms' registry.</t>
        <section anchor="cose-algorithms-registry">
          <name>COSE Algorithms Registry</name>
          <ul spacing="normal">
            <li>
              <t>Name: HPKE-8</t>
            </li>
            <li>
              <t>Value: TBD1</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-9</t>
            </li>
            <li>
              <t>Value: TBD2</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-10</t>
            </li>
            <li>
              <t>Value: TBD3</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-11</t>
            </li>
            <li>
              <t>Value: TBD4</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-12</t>
            </li>
            <li>
              <t>Value: TBD5</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-13</t>
            </li>
            <li>
              <t>Value: TBD6</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-14</t>
            </li>
            <li>
              <t>Value: TBD7</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-512 KEM, the SHAKE256 KDF, and the AES-128-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-15</t>
            </li>
            <li>
              <t>Value: TBD8</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-16</t>
            </li>
            <li>
              <t>Value: TBD9</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-1024 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-8-KE</t>
            </li>
            <li>
              <t>Value: TBD10</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-9-KE</t>
            </li>
            <li>
              <t>Value: TBD11</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-10-KE</t>
            </li>
            <li>
              <t>Value: TBD12</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-11-KE</t>
            </li>
            <li>
              <t>Value: TBD13</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-12-KE</t>
            </li>
            <li>
              <t>Value: TBD14</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-13-KE</t>
            </li>
            <li>
              <t>Value: TBD15</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-14-KE</t>
            </li>
            <li>
              <t>Value: TBD16</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-512 KEM, the SHAKE256 KDF, and the AES-128-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-15-KE</t>
            </li>
            <li>
              <t>Value: TBD17</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-16-KE</t>
            </li>
            <li>
              <t>Value: TBD18</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-1024 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Ilari Liusvaara and Orie Steele for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-jose-hpke-encrypt">
          <front>
            <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="30" month="November" year="2025"/>
            <abstract>
              <t>   This specification defines how to use Hybrid Public Key Encryption
   (HPKE) with JSON Web Encryption (JWE).  HPKE enables public key
   encryption of arbitrary-sized plaintexts to a recipient's public key,
   and provides security against adaptive chosen ciphertext attacks.
   This specification chooses a specific subset of the HPKE features to
   use with JWE.

   This specification updates RFC 7516 (JWE) to enable use of the
   Integrated Encryption Key Establishment Mode.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-jose-hpke-encrypt-15"/>
        </reference>
        <reference anchor="I-D.ietf-cose-hpke">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Ajitomi, Daisuke" initials="A." surname="Daisuke">
              <organization>bibital</organization>
            </author>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="2" month="February" year="2026"/>
            <abstract>
              <t>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE is a general encryption framework utilizing an asymmetric key
   encapsulation mechanism (KEM), a key derivation function (KDF), and
   an Authenticated Encryption with Associated Data (AEAD) algorithm.

   This document defines the use of HPKE with COSE.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by the
   pre-shared key authenticated variant of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-hpke-21"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>Selkie Cryptography</organization>
            </author>
            <date day="6" month="November" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="27" month="January" year="2026"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a post-quantum
   (PQ) KEM with a traditional cryptographic component.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-08"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="15" month="November" year="2025"/>
            <abstract>
              <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HPKE-IANA" target="https://www.iana.org/assignments/hpke/hpke.xhtml">
          <front>
            <title>Hybrid Public Key Encryption (HPKE) IANA Registry</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
