<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-ecdhe-mlkem-update-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Hybrid ECDHE-MLKEM Update">Update to Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-ecdhe-mlkem-update-00"/>
    <author initials="M." surname="Usama Sardar" fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <postal>
          <city>Dresden</city>
          <country>Germany</country>
        </postal>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="February" day="25"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>hybrid</keyword>
    <keyword>post-quantum</keyword>
    <abstract>
      <?line 41?>

<t>This is a quick update of to-be RFC <xref target="I-D.ietf-tls-ecdhe-mlkem"/> for recommending the three hybrid key agreement mechanisms in TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-ecdhe-mlkem-update/draft-usama-tls-ecdhe-mlkem-update.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-ecdhe-mlkem-update/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-ecdhe-mlkem-update"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The readers are assumed to be familiar with <xref target="I-D.ietf-tls-ecdhe-mlkem"/> and <xref target="RFC9847"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>Given the risk of "hardvest-now, decrypt-later" attacks <xref target="I-D.ietf-pquip-pqc-engineers"/>, we believe that the hybrid key agreement mechanisms need to be recommended.</t>
        <t><xref section="3" sectionFormat="of" target="RFC9847"/> defines the meaning of "Y" in "Recommended" column as follows:</t>
        <blockquote>
          <t>Y:
Indicates that the IETF has consensus that the item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated mechanism is fit for the purpose for which it was defined. Careful reading of the documentation for the mechanism is necessary to understand the applicability of that mechanism. The IETF could recommend mechanisms that have limited applicability but will provide applicability statements that describe any limitations of the mechanism or necessary constraints on its use.</t>
        </blockquote>
        <t>This draft aims to build the mentioned consensus.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="I-D.ietf-tls-ecdhe-mlkem"/> apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests the following updates to three entries in the <eref target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8">TLS Supported Groups registry</eref>, according to the procedures in <xref section="6" sectionFormat="of" target="RFC9847"/>.</t>
      <section anchor="secp256r1mlkem768">
        <name>SecP256r1MLKEM768</name>
        <dl>
          <dt>Recommended:</dt>
          <dd>
            <t>Y</t>
          </dd>
        </dl>
      </section>
      <section anchor="x25519mlkem768">
        <name>X25519MLKEM768</name>
        <dl>
          <dt>Recommended:</dt>
          <dd>
            <t>Y</t>
          </dd>
        </dl>
      </section>
      <section anchor="secp384r1mlkem1024">
        <name>SecP384r1MLKEM1024</name>
        <dl>
          <dt>Recommended:</dt>
          <dd>
            <t>Y</t>
          </dd>
        </dl>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Recommended</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">4587</td>
              <td align="left">SecP256r1MLKEM768</td>
              <td align="left">Y</td>
            </tr>
            <tr>
              <td align="left">4588</td>
              <td align="left">X25519MLKEM768</td>
              <td align="left">Y</td>
            </tr>
            <tr>
              <td align="left">4589</td>
              <td align="left">SecP384r1MLKEM1024</td>
              <td align="left">Y</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-ecdhe-mlkem">
          <front>
            <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <date day="8" month="February" year="2026"/>
            <abstract>
              <t>   This draft defines three hybrid key agreement mechanisms for TLS 1.3
   - X25519MLKEM768, SecP256r1MLKEM768, and SecP384r1MLKEM1024 - that
   combine the post-quantum ML-KEM (Module-Lattice-Based Key
   Encapsulation Mechanism) with an ECDHE (Elliptic Curve Diffie-
   Hellman) exchange.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ecdhe-mlkem-04"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9847">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document updates the changes to the TLS and DTLS IANA registries made in RFC 8447. It adds a new value, "D" for discouraged, to the "Recommended" column of the selected TLS registries and adds a "Comment" column to all active registries that do not already have a "Comment" column. Finally, it updates the registration request instructions.</t>
              <t>This document updates RFC 8447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9847"/>
          <seriesInfo name="DOI" value="10.17487/RFC9847"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
      </references>
    </references>
    <?line 121?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank the authors and contributors of <xref target="I-D.ietf-tls-ecdhe-mlkem"/> for their work.
We thank Eric Rescorla for this proposal.
We also thank Bas Westerbaan for the initial idea.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
