<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-cose-jose-pqc-hybrid-hpke-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC &amp; PQ/T Hybrid KEMs for HPKE (JOSE/COSE)">Post-Quantum and Hybrid KEMs for HPKE with JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-cose-jose-pqc-hybrid-hpke-11"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author fullname="Hannes Tschofenig">
      <organization/>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2026" month="February" day="16"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>PQC</keyword>
    <keyword>COSE</keyword>
    <keyword>JOSE</keyword>
    <keyword>Hybrid</keyword>
    <keyword>HPKE</keyword>
    <keyword>Post-Quantum</keyword>
    <abstract>
      <?line 65?>

<t>This document specifies the use of Post-Quantum (PQC) and Post-Quantum/Traditional (PQ/T) Hybrid Key Encapsulation Mechanisms (KEMs) within the Hybrid Public Key Encryption (HPKE) for JOSE and COSE. It defines algorithm identifiers and key formats to support pure post-quantum algorithms (ML-KEM) and their PQ/T hybrid combinations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-cose-jose-pqc-hybrid/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        cose Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to Post-Quantum Cryptography (PQC) is unique in the history of modern digital cryptography in that neither the traditional algorithms nor the post-quantum algorithms are fully trusted to protect data for the required data lifetimes. The traditional algorithms, such as RSA and elliptic curve cryptography (ECC), will fall to quantum cryptanalysis, while the post-quantum algorithms face uncertainty about the underlying mathematics, compliance issues, unknown vulnerabilities, hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs.</t>
      <t>During this transition, deployments may adopt different strategies depending on their security posture, risk tolerance, and external constraints. Hybrid key exchange is generally preferred over pure PQC key exchange because it provides defense in depth by combining the strengths of both traditional and post-quantum algorithms. This approach ensures continued security even if one of the component algorithms is compromised during the transitional period.</t>
      <t>However, pure PQC key exchange may be required for specific deployments with regulatory or compliance mandates that necessitate the exclusive use of post-quantum cryptography. Such requirements may arise in environments governed by stringent cryptographic standards that prohibit reliance on traditional public-key algorithms.</t>
      <t>Hybrid Public Key Encryption (HPKE) specifies a scheme for encrypting arbitrary-length plaintexts to a recipient’s public key. The use of HPKE with JOSE and COSE is specified in <xref target="I-D.ietf-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/>, respectively. HPKE can be extended to support both pure PQC and post-quantum/traditional (PQ/T) hybrid Key Encapsulation Mechanisms (KEMs), as defined in <xref target="I-D.ietf-hpke-pq"/>. This document specifies the use of these KEMs in HPKE for JOSE and COSE.</t>
      <t>Supporting both pure PQC and PQ/T hybrid KEMs enables flexible deployment choices: hybrid mechanisms provide a conservative transition strategy with defense in depth, while pure PQC mechanisms accommodate deployments with regulatory, compliance, or policy-driven requirements for exclusive use of PQC.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
      <t>"Traditional Algorithm":  An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems. In the context of JOSE, examples of traditional key exchange algorithms include Elliptic Curve Diffie-Hellman Ephemeral Static <xref target="RFC6090"/> <xref target="RFC8037"/>. In the context of COSE, examples of traditional key exchange algorithms include Ephemeral-Static (ES) DH and Static-Static (SS) DH <xref target="RFC9052"/>.</t>
      <t>"Post-Quantum Algorithm":  An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Examples of PQC key exchange algorithms include ML-KEM.</t>
      <t>"Post-Quantum Traditional (PQ/T) Hybrid Scheme":  A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm.</t>
      <t>"PQ/T Hybrid Key Encapsulation Mechanism":  A multi-algorithm KEM made up of two or more component KEM algorithms where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="construction">
      <name>Construction</name>
      <t>ML-KEM is a one-pass (store-and-forward) cryptographic mechanism for an originator to securely send keying material to a recipient using the recipient's ML-KEM public key. Three parameter sets for ML-KEMs are specified by <xref target="FIPS203"/>. In order of increasing security strength (and decreasing performance), these parameter sets
are ML-KEM-512, ML-KEM-768, and ML-KEM-1024. For pure PQC, the ML-KEM algorithms are used as standalone KEMs within the HPKE framework as defined in <xref target="I-D.ietf-hpke-pq"/>.</t>
      <t>While this document defines ciphersuites for all three parameter sets, implementers should follow the guidance in Section 3 of <xref target="I-D.ietf-hpke-pq"/> regarding the selection of security levels. Specifically, it is noted that while ML-KEM-512 provides NIST security category 1, the use of ML-KEM-768 or ML-KEM-1024 is generally preferred to provide a higher security margin against potential future cryptanalysis.</t>
      <t>PQ/T algorithms for HPKE <xref target="I-D.ietf-hpke-pq"/> use a multi-algorithm scheme, where one component algorithm is a post-quantum algorithm and another one is a traditional algorithm. The hybrid combiner construction, such as the C2PRICombiner defined in <xref target="I-D.irtf-cfrg-hybrid-kems"/>, combines the shared secrets and public values from a post-quantum KEM and a traditional KEM to derive a single shared secret for HPKE.</t>
    </section>
    <section anchor="alignment-with-jose-hpke-modes">
      <name>Alignment with JOSE HPKE Modes</name>
      <t>The JOSE HPKE specification <xref target="I-D.ietf-jose-hpke-encrypt"/> and the COSE HPKE specification <xref target="I-D.ietf-cose-hpke"/> define the use of HPKE with two Key Management Modes:</t>
      <ul spacing="normal">
        <li>
          <t>Key Encryption, and</t>
        </li>
        <li>
          <t>Integrated Encryption.</t>
        </li>
      </ul>
      <t>In both JOSE and COSE, the selected Key Management Mode determines how HPKE is applied at the message layer. In Key Encryption mode, HPKE is used to encrypt a Content Encryption Key (CEK), which is then used to encrypt the payload. In Integrated Encryption mode, HPKE is used directly to encrypt the payload, and no separate CEK is employed.</t>
      <t>Each Key Management Mode is identified by a distinct algorithm identifier (alg) in both JOSE and COSE. This document registers separate HPKE algorithm identifiers for Key Encryption and Integrated Encryption for both pure PQC and PQ/T hybrid HPKE instantiations.</t>
      <t>This separation ensures that JOSE and COSE implementations can determine the intended HPKE Key Management Mode solely from the alg value, without ambiguity, and preserves compatibility with existing HPKE processing models.</t>
    </section>
    <section anchor="ciphersuite-registration">
      <name>Ciphersuite Registration</name>
      <t>This specification registers a set of pure PQC and PQ/T hybrid KEMs for use with HPKE. In this context, an HPKE ciphersuite is defined as a combination of the following algorithm components:</t>
      <ul spacing="normal">
        <li>
          <t>KEM algorithm, which may be either:
          </t>
          <ul spacing="normal">
            <li>
              <t>a pure PQC KEM (for example, ML-KEM-768), or</t>
            </li>
            <li>
              <t>a PQ/T hybrid KEM that combines a PQC KEM with a traditional
key-exchange algorithm (for example, ML-KEM-768 + X25519, defined as
"MLKEM768-X25519" in <xref target="I-D.ietf-hpke-pq"/>)</t>
            </li>
          </ul>
        </li>
        <li>
          <t>KDF algorithm</t>
        </li>
        <li>
          <t>AEAD algorithm</t>
        </li>
      </ul>
      <t>The values for KEM, KDF, and AEAD are drawn from the HPKE IANA registry <xref target="HPKE-IANA"/>. Consequently, JOSE and COSE can only use algorithm combinations that are already defined and registered for HPKE.</t>
      <t>The HPKE ciphersuites defined for use with JOSE and COSE, including both pure PQC and PQ/T hybrid KEMs, are specified in <xref target="IANA"/>.</t>
      <t>Note that the pure PQC and PQ/T hybrid KEMs defined for HPKE are not authenticated KEMs. As a result, only the HPKE Base mode is supported when using these KEMs, in accordance with the HPKE and JOSE/COSE HPKE specifications.</t>
    </section>
    <section anchor="akp-key-type-for-use-with-pqc-and-pqt-hybrid-hpke-algorithms">
      <name>AKP Key Type for Use with PQC and PQ/T Hybrid HPKE Algorithms</name>
      <t>This section describes the required parameters for an "AKP" key type, as
defined in <xref target="I-D.ietf-cose-dilithium"/>, and its use with pure PQC
and PQ/T hybrid algorithms for HPKE, as defined in {#XWING} and {#XWING-KE}. 
An example key representation is also provided for illustration.</t>
      <section anchor="required-parameters">
        <name>Required Parameters</name>
        <t>A JSON Web Key (JWK) or COSE_Key with a key type (<tt>kty</tt>) for use with pure PQC
or PQ/T hybrid algorithms for HPKE includes the following parameters:</t>
        <ul spacing="normal">
          <li>
            <t>kty (Key Type)<br/>
The <tt>kty</tt> parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> be set to "AKP".</t>
          </li>
          <li>
            <t>alg (Algorithm)<br/>
The <tt>alg</tt> parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> identify the pure PQC or
PQ/T hybrid algorithm for HPKE, as defined in {#XWING} or {#XWING-KE}.<br/>
HPKE algorithms using pure PQC or PQ/T hybrid KEMs are those registered
in the "JSON Web Signature and Encryption Algorithms" registry and the
"COSE Algorithms" registry, and are derived from the corresponding
KEM identifiers in the HPKE IANA registry.</t>
          </li>
          <li>
            <t>pub (Public Key)<br/>
The <tt>pub</tt> parameter <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14> contain the public
encapsulation key (<tt>pk</tt>) as defined in Section 5.1 of
<xref target="I-D.irtf-cfrg-hybrid-kems"/>. For hybrid KEMs, the PQC KEM public key 
<bcp14>MUST</bcp14> be placed first, followed immediately by the traditional public key, 
as specified in <xref target="I-D.ietf-hpke-pq"/>. No padding or delimiters are used 
between the keys.  </t>
            <t>
When represented as a JWK, this value <bcp14>MUST</bcp14> be base64url-encoded.</t>
          </li>
          <li>
            <t>priv (Private Key)<br/>
When representing a private key, the <tt>priv</tt> parameter <bcp14>MUST</bcp14> be present
and <bcp14>MUST</bcp14> contain the private decapsulation key (<tt>sk</tt>) as defined in
Section 5.1 of <xref target="I-D.irtf-cfrg-hybrid-kems"/>. For hybrid KEMs, the PQC 
KEM private key <bcp14>MUST</bcp14> be placed first, followed immediately by the traditional private key.<br/>
When represented as a JWK, this value <bcp14>MUST</bcp14> be base64url-encoded.</t>
          </li>
        </ul>
        <section anchor="example">
          <name>Example</name>
          <t>The following is an example JWK representation of an "AKP" key for the "MLKEM768-X25519-SHAKE256-AES-256-GCM" algorithm:</t>
          <artwork><![CDATA[
{
    "kty"  : "AKP", 
    "alg"  : "HPKE-8", 
    "pub"  : "4iNrNajCSz...tmrrIzQSQQO9lNA", 
    "priv" : "f5wrpOiP...rPpm7yY" 
}
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="security-strength-analysis-of-registered-hpke-ciphersuites">
      <name>Security Strength Analysis of Registered HPKE Ciphersuites</name>
      <t>This section provides an analysis of the security strength of the HPKE ciphersuites defined in this document.</t>
      <artwork><![CDATA[
+----------+--------+------------+-----------+-----------+-------------------+--------------+
| Alg      | Mode   | KEM        | Trad      | KDF       | AEAD              | Sec          |
+----------+--------+------------+-----------+-----------+-------------------+--------------+
| HPKE-8   | Hybrid | MLKEM-768  | P-256     | SHAKE256  | AES-256-GCM       | Level 3/C128 |
| HPKE-9   | Hybrid | MLKEM-768  | P-256     | SHAKE256  | ChaCha20-Poly1305 | Level 3/C128 |
| HPKE-10  | Hybrid | MLKEM-768  | X25519    | SHAKE256  | AES-256-GCM       | Level 3/C128 |
| HPKE-11  | Hybrid | MLKEM-768  | X25519    | SHAKE256  | ChaCha20-Poly1305 | Level 3/C128 |
| HPKE-12  | Hybrid | MLKEM-1024 | P-384     | SHAKE256  | AES-256-GCM       | Level 5/C192 |
| HPKE-13  | Hybrid | MLKEM-1024 | P-384     | SHAKE256  | ChaCha20-Poly1305 | Level 5/C192 |
| HPKE-14  | Level  | MLKEM-512  | -         | SHAKE256  | AES-128-GCM       | Level 1      |
| HPKE-15  | Level  | MLKEM-768  | -         | SHAKE256  | AES-256-GCM       | Level 3      |
| HPKE-16  | Level  | MLKEM-1024 | -         | SHAKE256  | AES-256-GCM       | Level 5      |
+----------+--------+------------+-----------+-----------+-------------------+--------------+
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Level x = NIST post-quantum security level</t>
        </li>
        <li>
          <t>Cyyy = Approximate classical security strength in bits for traditional algorithms.</t>
        </li>
        <li>
          <t>Hybrid classical strength is bounded by the traditional component</t>
        </li>
        <li>
          <t>-KE variants share identical cryptographic properties and are omitted</t>
        </li>
      </ul>
      <t>NIST post-quantum security Levels 1, 3, and 5 are defined by reference to the classical cost of breaking AES-128, AES-192, and AES-256, respectively. These levels apply to post-quantum algorithm targets and do not constitute classifications of the AES primitive itself.</t>
      <t>KDF Selection: SHAKE256 is selected as the HPKE KDF to align with the SHAKE-based extendable-output functions (XOFs) used internally by ML-KEM. This avoids introducing an additional hash primitive into the cryptographic processing pipeline. The security capacity of SHAKE256 is sufficient to support NIST security levels 1, 3, and 5 without introducing a bottleneck in key derivation. This choice does not imply that alternative KDFs are cryptographically incompatible with ML-KEM; rather, using the same hash family reduces the number of distinct cryptographic primitives that implementations must support.</t>
      <t>AEAD Selection: AES-128-GCM provides approximately 128-bit symmetric security strength and is sufficient for Level 3 constructions. As discussed in Section 3.1 of <xref target="I-D.ietf-pquip-pqc-engineers"/>, symmetric cryptography such as AES remains secure in a post-quantum setting, and 128-bit symmetric algorithms are considered quantum-safe for the foreseeable future.</t>
      <t>Nevertheless, this specification mandates AES-256-GCM for all Level 3 ciphersuites to maintain consistent symmetric key sizing across higher-strength suites and to avoid introducing AES-128 into Level 3 configurations. Because the HPKE AEAD registry does not define an identifier for AES-192-GCM, AES-256-GCM is selected as the stronger available AEAD option. AES-128-GCM, used in HPKE-14, limits the symmetric security strength to approximately 128 bits, which is consistent with ML-KEM-512 (Level 1).</t>
      <t>PQ/T Hybrid: ML-KEM-1024 is paired with P-384 rather than P-521. While P-521 offers higher classical security strength, P-384 already provides a strong classical fallback (192-bit security), is widely implemented, and aligns with existing TLS PQ/T hybrid construction.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="I-D.ietf-hpke-pq"/>, <xref target="I-D.ietf-jose-hpke-encrypt"/> and <xref target="I-D.ietf-cose-hpke"/> are to be taken into account.</t>
      <t>The shared secrets computed in the hybrid key exchange must be computed in a way that achieves the "hybrid" property: the resulting secret is secure as long as at least one of the component key exchange algorithms is unbroken. PQC KEMs used in the manner described in this document <bcp14>MUST</bcp14> explicitly be designed to be secure in the event that the public key is reused, such as achieving IND-CCA2 security.ML-KEM has such security properties.</t>
      <section anchor="post-quantum-security-for-multiple-recipients">
        <name>Post-Quantum Security for Multiple Recipients</name>
        <t>In HPKE JWE Key Encryption, when encrypting the Content Encryption Key (CEK) for multiple recipients, it is crucial to consider the security requirements of the message to safeguard against "Harvest Now, Decrypt Later" attacks. For messages requiring post-quantum security, all recipients <bcp14>MUST</bcp14> use algorithms supporting post-quantum cryptographic methods, such as PQC KEMs or Hybrid PQ/T KEMs. Using traditional algorithms (e.g., ECDH-ES) for any recipient in these scenarios compromises the overall security of the message.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="jose">
        <name>JOSE</name>
        <t>This document requests IANA to add new values to the "JSON Web Signature and Encryption Algorithms" registry.</t>
        <section anchor="XWING">
          <name>JOSE Algorithms for Integrated Encryption</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: HPKE-8</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-9</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-10</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-11</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-12</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-13</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Documents(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-14</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-512 KEM, the SHAKE256 KDF, and the AES-128-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-15</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-768 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-16</t>
            </li>
            <li>
              <t>Algorithm Description: Integrated Encryption with HPKE using ML-KEM-1024 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
          </ul>
        </section>
        <section anchor="XWING-KE">
          <name>JOSE Algorithms for Key Encryption</name>
          <ul spacing="normal">
            <li>
              <t>Algorithm Name: HPKE-8-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-9-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-10-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-11-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-12-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-13-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-14-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-512 KEM, the SHAKE256 KDF, and the AES-128-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-15-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-768 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
            <li>
              <t>Algorithm Name: HPKE-16-KE</t>
            </li>
            <li>
              <t>Algorithm Description: Key Encryption with HPKE using ML-KEM-1024 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Algorithm Usage Location(s): "alg"</t>
            </li>
            <li>
              <t>JOSE Implementation Requirements: Optional</t>
            </li>
            <li>
              <t>Change Controller: IANA</t>
            </li>
            <li>
              <t>Specification Document(s): [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Algorithm Analysis Document(s): TODO</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <t>This document requests IANA to add new values to the 'COSE Algorithms' registry.</t>
        <section anchor="cose-algorithms-registry">
          <name>COSE Algorithms Registry</name>
          <ul spacing="normal">
            <li>
              <t>Name: HPKE-8</t>
            </li>
            <li>
              <t>Value: TBD1</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-9</t>
            </li>
            <li>
              <t>Value: TBD2</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-10</t>
            </li>
            <li>
              <t>Value: TBD3</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-11</t>
            </li>
            <li>
              <t>Value: TBD4</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-12</t>
            </li>
            <li>
              <t>Value: TBD5</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-13</t>
            </li>
            <li>
              <t>Value: TBD6</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-14</t>
            </li>
            <li>
              <t>Value: TBD7</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-512 KEM, the SHAKE256 KDF, and the AES-128-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-15</t>
            </li>
            <li>
              <t>Value: TBD8</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-768 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-16</t>
            </li>
            <li>
              <t>Value: TBD9</t>
            </li>
            <li>
              <t>Description: COSE HPKE Integrated Encryption using ML-KEM-1024 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-8-KE</t>
            </li>
            <li>
              <t>Value: TBD10</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-9-KE</t>
            </li>
            <li>
              <t>Value: TBD11</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 + P-256 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-10-KE</t>
            </li>
            <li>
              <t>Value: TBD12</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-11-KE</t>
            </li>
            <li>
              <t>Value: TBD13</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 + X25519 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-12-KE</t>
            </li>
            <li>
              <t>Value: TBD14</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-13-KE</t>
            </li>
            <li>
              <t>Value: TBD15</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-1024 + P-384 Hybrid KEM, the SHAKE256 KDF, and the ChaCha20Poly1305 AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-14-KE</t>
            </li>
            <li>
              <t>Value: TBD16</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-512 KEM, the SHAKE256 KDF, and the AES-128-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-15-KE</t>
            </li>
            <li>
              <t>Value: TBD17</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-768 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
            <li>
              <t>Name: HPKE-16-KE</t>
            </li>
            <li>
              <t>Value: TBD18</t>
            </li>
            <li>
              <t>Description: COSE HPKE Key Encryption using ML-KEM-1024 KEM, the SHAKE256 KDF, and the AES-256-GCM AEAD.</t>
            </li>
            <li>
              <t>Capabilities: [kty]</t>
            </li>
            <li>
              <t>Change Controller: IESG</t>
            </li>
            <li>
              <t>Reference: [[TBD: This RFC]]</t>
            </li>
            <li>
              <t>Recommended: No</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Ilari Liusvaara and Orie Steele for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-jose-hpke-encrypt">
          <front>
            <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="30" month="November" year="2025"/>
            <abstract>
              <t>   This specification defines how to use Hybrid Public Key Encryption
   (HPKE) with JSON Web Encryption (JWE).  HPKE enables public key
   encryption of arbitrary-sized plaintexts to a recipient's public key,
   and provides security against adaptive chosen ciphertext attacks.
   This specification chooses a specific subset of the HPKE features to
   use with JWE.

   This specification updates RFC 7516 (JWE) to enable use of the
   Integrated Encryption Key Establishment Mode.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-jose-hpke-encrypt-15"/>
        </reference>
        <reference anchor="I-D.ietf-cose-hpke">
          <front>
            <title>Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Ajitomi, Daisuke" initials="A." surname="Daisuke">
              <organization>bibital</organization>
            </author>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="2" month="February" year="2026"/>
            <abstract>
              <t>   This specification defines hybrid public-key encryption (HPKE) for
   use with CBOR Object Signing and Encryption (COSE).  HPKE offers a
   variant of public-key encryption of arbitrary-sized plaintexts for a
   recipient public key.

   HPKE is a general encryption framework utilizing an asymmetric key
   encapsulation mechanism (KEM), a key derivation function (KDF), and
   an Authenticated Encryption with Associated Data (AEAD) algorithm.

   This document defines the use of HPKE with COSE.  Authentication for
   HPKE in COSE is provided by COSE-native security mechanisms or by the
   pre-shared key authenticated variant of HPKE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-hpke-21"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>Selkie Cryptography</organization>
            </author>
            <date day="6" month="November" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="27" month="January" year="2026"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a post-quantum
   (PQ) KEM with a traditional cryptographic component.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-08"/>
        </reference>
        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <date day="15" month="November" year="2025"/>
            <abstract>
              <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>Module-Lattice-based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="HPKE-IANA" target="https://www.iana.org/assignments/hpke/hpke.xhtml">
          <front>
            <title>Hybrid Public Key Encryption (HPKE) IANA Registry</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC6090">
          <front>
            <title>Fundamental Elliptic Curve Cryptography Algorithms</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="M. Salter" initials="M." surname="Salter"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6090"/>
          <seriesInfo name="DOI" value="10.17487/RFC6090"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
