ML-DSA for JOSE and COSE
draft-ietf-cose-dilithium-11
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2025-11-18
|
11 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
|
2025-11-18
|
11 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
|
2025-11-18
|
11 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
|
2025-11-15
|
11 | Orie Steele | New version available: draft-ietf-cose-dilithium-11.txt |
|
2025-11-15
|
11 | Orie Steele | New version approved |
|
2025-11-15
|
11 | (System) | Request for posting confirmation emailed to previous authors: Michael Prorock , Orie Steele |
|
2025-11-15
|
11 | Orie Steele | Uploaded new revision |
|
2025-10-29
|
10 | (System) | RFC Editor state changed to EDIT from AUTH |
|
2025-10-24
|
10 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
|
2025-10-20
|
10 | (System) | RFC Editor state changed to AUTH from EDIT |
|
2025-10-20
|
10 | (System) | RFC Editor state changed to EDIT |
|
2025-10-20
|
10 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
|
2025-10-20
|
10 | (System) | Announcement was received by RFC Editor |
|
2025-10-15
|
10 | (System) | IANA Action state changed to In Progress |
|
2025-10-15
|
10 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
|
2025-10-15
|
10 | Cindy Morgan | IESG has approved the document |
|
2025-10-15
|
10 | Cindy Morgan | Closed "Approve" ballot |
|
2025-10-15
|
10 | Cindy Morgan | Ballot approval text was generated |
|
2025-10-15
|
10 | (System) | Removed all action holders (IESG state changed) |
|
2025-10-15
|
10 | Paul Wouters | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
|
2025-10-14
|
10 | Ketan Talaulikar | [Ballot comment] Thanks to the authors and the WG for their work on this document and for the updates to address my previous comments. |
|
2025-10-14
|
10 | Ketan Talaulikar | [Ballot Position Update] Position for Ketan Talaulikar has been changed to No Objection from Discuss |
|
2025-10-14
|
10 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
|
2025-10-14
|
10 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-10-14
|
10 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2025-10-14
|
10 | Orie Steele | New version available: draft-ietf-cose-dilithium-10.txt |
|
2025-10-14
|
10 | Orie Steele | New version approved |
|
2025-10-14
|
10 | (System) | Request for posting confirmation emailed to previous authors: Michael Prorock , Orie Steele |
|
2025-10-14
|
10 | Orie Steele | Uploaded new revision |
|
2025-10-09
|
09 | (System) | Changed action holders to Michael Prorock, Orie Steele (IESG state changed) |
|
2025-10-09
|
09 | Morgan Condie | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
|
2025-10-08
|
09 | Deb Cooley | [Ballot comment] Thanks to Peter Yee for their secdir reviews. I found this specification easy to read and understand. I only have one comment/question: Section … [Ballot comment] Thanks to Peter Yee for their secdir reviews. I found this specification easy to read and understand. I only have one comment/question: Section 7.2: While this specification does not support HashML-DSA, there is no mention about whether a pre-hash option is acceptable or expected (as in App D of draft-ietf-lamps-dilithium-certificates). However, I'm not sure where that would be mentioned in this specification. |
|
2025-10-08
|
09 | Deb Cooley | [Ballot Position Update] New position, Yes, has been recorded for Deb Cooley |
|
2025-10-07
|
09 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-cose-dilithium-09 CC @evyncke Thank you for the work put into this document. Please find below some … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-cose-dilithium-09 CC @evyncke Thank you for the work put into this document. Please find below some non-blocking COMMENT points/nits (replies would be appreciated even if only for my own education). Special thanks to Lucas Prabel for the shepherd's detailed write-up including the WG consensus *and* the justification of the intended status. I hope that this review helps to improve the document, Regards, -éric ## COMMENTS (non-blocking) ### Abstract & section 1 s/This document describes/This document *specifies*/ ### Section 3 Should `JWK` be expanded ? Or a reference be added ? ### Section 4 s/by NIST so/by US NIST so/ as not every reader lives in the USA. ### Section 5 Sentence such as `This document requests the registration` should rather be in the IANA considerations. Let's use here "This document specifies..." or similar. Let's be consistent and use double quotes around parameter names, e.g., in `The ctx parameter` (this could happen in other places as well) while `The "pub" parameter` is also used. Out of curiosity, where are the -44, -65, and -87 come from ? These numbers do not seem to be linked to key sizes. ### Section 9.2 As indicated by idnits, reference NIST-PQC-2022 is never used, so, let's remove it. |
|
2025-10-07
|
09 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
|
2025-10-07
|
09 | Andy Newton | [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton |
|
2025-10-07
|
09 | Roman Danyliw | [Ballot comment] Thank you to Russ Housley for the GENART review. ** Editorial. A number of references in the document are not formal references. For … [Ballot comment] Thank you to Russ Housley for the GENART review. ** Editorial. A number of references in the document are not formal references. For example: -- Section 4, “FIPS 204” vs. “[FIPS 204]” (multiple instances) -- Section 8.1.1, “RFC 9053 and RFC 9054” vs. “[RFC9053] and [RFC9054]” (multiple instances) ** Section 8.1.1.* -- Why is the change control entity specific named here, but it is in the JOSE registrations? ** Section 8.1.4.4.* -- These registration have a row with “Value registry: [IANA.jose] Algorithms”. That is not in the RFC7518 template or in the production https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms registry |
|
2025-10-07
|
09 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
|
2025-10-07
|
09 | Ketan Talaulikar | [Ballot discuss] Just some easy to address comments related to references that perhaps rise to the level of DISCUSS. Sections 3 and 5: The URLs … [Ballot discuss] Just some easy to address comments related to references that perhaps rise to the level of DISCUSS. Sections 3 and 5: The URLs [IANA.jose] and [IANA.cose] are informative references? Section 8: Several RFCs here that should be normative or informative references? |
|
2025-10-07
|
09 | Ketan Talaulikar | [Ballot comment] Thanks to the authors and the WG for their work on this document. Please find below some comments and suggestions to improve the … [Ballot comment] Thanks to the authors and the WG for their work on this document. Please find below some comments and suggestions to improve the clarity of this document. General: s/NIST/US NIST and S/FIPS/US NIST FIPS - we want to be clear this is coming from an US entity Section 1: s/draft-ietf-cose-key-thumbprint/RFC9679 Perhaps change "as described in [FIPS-204] with JOSE and COSE" to "as described in [FIPS-204], in conjunction with JOSE and COSE." ? Perhaps "can be compared according the procedures..." should be "can be compared according to the procedures..." ? Section 3: Keep the actions for IANA in the IANA considerations sections alone. Perhaps instead of "This document requests the registration of the following key types in [IANA.jose]:", how about "This document introduces the following key types (see section 8.1.x for details):" This can be done for other similar sentences (in this section as well as section 5). The URLs [IANA.jose] are better placed in the respective IANA consideration sub-sections? s/use of multiple key type/the use of multiple key type s/key parameters are base64url encoded/the key parameters are base64url encoded Perhaps, instead of "Some algorithms might require or encourage additional structure or length checks for associated key type parameters", would this be more clear - "Some algorithms may require or recommend additional structure or length checks for associated key type parameters." ? ... not sure what is meant by encourage here? Section 5: Suggest "See the ML-DSA Private Keys section of this document for more details." change to "See Section 4, ML-DSA Private Keys, for further details." Perhaps instead of "ML-DSA might not be the best choice for use cases that require small keys or signatures." it could be "ML-DSA may not be suitable for use cases requiring small keys or signatures." ? |
|
2025-10-07
|
09 | Ketan Talaulikar | [Ballot Position Update] New position, Discuss, has been recorded for Ketan Talaulikar |
|
2025-10-07
|
09 | Peter Yee | Request for Telechat review by SECDIR Completed: Ready. Reviewer: Peter Yee. Sent review to list. |
|
2025-10-06
|
09 | Mike Bishop | [Ballot comment] In Section 5, the reference for the registry where the registrations should be made is to the entire COSE/JOSE registry groups, and the … [Ballot comment] In Section 5, the reference for the registry where the registrations should be made is to the entire COSE/JOSE registry groups, and the particular registries are not specified until Section 8. I initially thought the values requested were incorrect but then realized I was looking at the wrong registry on that page. In Section 8, however, the registries are referenced by name and the link to the registry is omitted. I think this could be made clearer by putting all the registration information in Section 8 (including links to specific registries) and focusing Section 5 on the use of the registered values. In Section 7.3, the normative requirement represented by "only a length check MUST be performed" is unclear. Should this be read "MUST NOT perform any checks other than length" or "MUST perform a length check and MAY perform additional checks as appropriate"? Or is this instead reflecting that a requirement already exists elsewhere and should be "a length check is required by Section x.y of [RFCabcd]"? ===NITS FOLLOW=== - Section 5, "needed, see" => "needed; see" - Section 7, "specification, see" => "specification; see" |
|
2025-10-06
|
09 | Mike Bishop | [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop |
|
2025-10-05
|
09 | Mahesh Jethanandani | [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani |
|
2025-10-05
|
09 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Peter Yee |
|
2025-10-03
|
09 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
|
2025-10-01
|
09 | Mohamed Boucadair | [Ballot comment] Hi Michael and Orie, Thanks for the effort put into this specification. Thanks also to Tiru Tirumaleswar Reddy for the OPSDIR review and … [Ballot comment] Hi Michael and Orie, Thanks for the effort put into this specification. Thanks also to Tiru Tirumaleswar Reddy for the OPSDIR review and to the authors for engaging and proposing changes. I went through https://github.com/cose-wg/draft-ietf-cose-dilithium/pull/25/files and trust this PR will be merged. The explanation about the seed only design choice and also calling out some ML-DSA deployment challenges are appreciated. I also trust the examples were validated. I have very minor comments: # Redundant IANA considerations Not sure why IANA requests are repeated twice in the document (Sections 3/4/5 and then IANA Section). I think it is better to have this in one single place. # Who is the target of this guidance? CURRENT: When registering new algorithms, use of multiple key type parameters for private information is NOT RECOMMENDED. # Citations Several RFCs are provided in the text but are not cited as references, e.g., RFC 9054 and RFC 7518. Please check through the doc. # Regional Matters Please s/FIPS 204/US FIPS 204 in the abstract and s/NIST/US NIST in Section 4 Cheers, Med |
|
2025-10-01
|
09 | Mohamed Boucadair | [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair |
|
2025-10-01
|
09 | Russ Housley | Request for Telechat review by GENART Completed: Ready. Reviewer: Russ Housley. Sent review to list. |
|
2025-10-01
|
09 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
|
2025-10-01
|
09 | Orie Steele | [Ballot Position Update] New position, Recuse, has been recorded for Orie Steele |
|
2025-09-30
|
09 | Gorry Fairhurst | [Ballot comment] This document does not describe a transport protocol change, and I have no related concerns. I see: draft-ietf-cose-key-thumbprint is alreday published as an … [Ballot comment] This document does not describe a transport protocol change, and I have no related concerns. I see: draft-ietf-cose-key-thumbprint is alreday published as an RFC (and that draft-ietf-lamps-dilithium-certificates is in the RFC-Ed queue. I have no additional review comments. |
|
2025-09-30
|
09 | Gorry Fairhurst | [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst |
|
2025-09-30
|
09 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
|
2025-09-29
|
09 | Jean Mahoney | Request for Telechat review by GENART is assigned to Russ Housley |
|
2025-09-27
|
09 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
|
2025-09-26
|
09 | Cindy Morgan | Placed on agenda for telechat - 2025-10-09 |
|
2025-09-26
|
09 | Paul Wouters | Ballot has been issued |
|
2025-09-26
|
09 | Paul Wouters | [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters |
|
2025-09-26
|
09 | Paul Wouters | Created "Approve" ballot |
|
2025-09-26
|
09 | Paul Wouters | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
|
2025-09-26
|
09 | Paul Wouters | Ballot writeup was changed |
|
2025-09-22
|
09 | Daniele Ceccarelli | Request for IETF Last Call review by OPSDIR Completed: Ready. Reviewer: Daniele Ceccarelli. |
|
2025-09-22
|
09 | Daniele Ceccarelli | Request for IETF Last Call review by OPSDIR is assigned to Daniele Ceccarelli |
|
2025-09-22
|
09 | Daniele Ceccarelli | Assignment of request for IETF Last Call review by OPSDIR to Niclas Comstedt was marked no-response |
|
2025-09-12
|
09 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2025-09-12
|
09 | Orie Steele | New version available: draft-ietf-cose-dilithium-09.txt |
|
2025-09-12
|
09 | Orie Steele | New version approved |
|
2025-09-12
|
09 | (System) | Request for posting confirmation emailed to previous authors: Michael Prorock , Orie Steele |
|
2025-09-12
|
09 | Orie Steele | Uploaded new revision |
|
2025-08-29
|
08 | Daniele Ceccarelli | Request for IETF Last Call review by OPSDIR is assigned to Niclas Comstedt |
|
2025-08-29
|
08 | Daniele Ceccarelli | Assignment of request for IETF Last Call review by OPSDIR to Tirumaleswar Reddy.K was marked no-response |
|
2025-08-16
|
08 | Peter Yee | Request for IETF Last Call review by SECDIR Completed: Has Issues. Reviewer: Peter Yee. Sent review to list. Submission of review completed at an earlier … Request for IETF Last Call review by SECDIR Completed: Has Issues. Reviewer: Peter Yee. Sent review to list. Submission of review completed at an earlier date. |
|
2025-08-16
|
08 | Peter Yee | Request for IETF Last Call review by SECDIR Completed: Has Issues. Reviewer: Peter Yee. |
|
2025-07-28
|
08 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2025-07-24
|
08 | David Dong | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
|
2025-07-24
|
08 | David Dong | IANA Experts State changed to Expert Reviews OK |
|
2025-07-23
|
08 | David Dong | IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-cose-dilithium-08. If any part of this review is inaccurate, please let us know. IANA understands that, upon … IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-cose-dilithium-08. If any part of this review is inaccurate, please let us know. IANA understands that, upon approval of this document, there are six actions which we must complete. First, in the COSE Algorithms registry in the CBOR Object Signing and Encryption (COSE) registry group located at: https://www.iana.org/assignments/cose/ the following three early allocations will be made permanent and their references changed to [ RFC-to-be ]: Name: ML-DSA-44 Value: -48 Description: CBOR Object Signing Algorithm for ML-DSA-44 Capabilities: [kty] Change Controller: IESG Recommended: Yes Name: ML-DSA-65 Value: -49 Description: CBOR Object Signing Algorithm for ML-DSA-65 Capabilities: [kty] Change Controller: IESG Recommended: Yes Name: ML-DSA-87 Value: -50 Description: CBOR Object Signing Algorithm for ML-DSA-87 Capabilities: [kty] Change Controller: IESG Recommended: Yes Second, in the COSE Key Types registry also in the CBOR Object Signing and Encryption (COSE) registry group located at: https://www.iana.org/assignments/cose/ the following registration will have its reference changed to [ RFC-to-be ]: Name: AKP Value: 7 Description: COSE Key Type for Algorithm Key Pairs Capabilities: [kty(7)] Third, in the COSE Key Type Parameters registry also in the CBOR Object Signing and Encryption (COSE) registry group located at: https://www.iana.org/assignments/cose/ the following two registrations will have their references changed to [ RFC-to-be ]: Key Type: [ TBD-at-Registration ] Name: pub Label: -1 CBOR Type: bstr Description: Public key Reference: [ RFC-to-be ] Key Type: [ TBD-at-Registration ] Name: priv Label: -2 CBOR Type: bstr Description: Private key Reference: [ RFC-to-be ] Please note that the priv registration is still pending expert approval for early registration. This registration will be added and the document will be marked IANA OK after this review has been completed. Fourth, in the JSON Web Signature and Encryption Algorithms registry in the JSON Object Signing and Encryption (JOSE) registry group located at: https://www.iana.org/assignments/jose/ the following three early allocations will be made permanent and their references changed to [ RFC-to-be ]: Algorithm Name: ML-DSA-44 Algorithm Description: ML-DSA-44 as described in FIPS 204. Algorithm Usage Location(s): alg JOSE Implementation Requirements: Optional Change Controller: IETF Value registry: [IANA.jose] Algorithms Algorithm Analysis Documents(s): [FIPS-204] Algorithm Name: ML-DSA-65 Algorithm Description: ML-DSA-65 as described in FIPS 204. Algorithm Usage Location(s): alg JOSE Implementation Requirements: Optional Change Controller: IETF Value registry: [IANA.jose] Algorithms Algorithm Analysis Documents(s): [FIPS-204] Algorithm Name: ML-DSA-87 Algorithm Description: ML-DSA-87 as described in FIPS 204. Algorithm Usage Location(s): alg JOSE Implementation Requirements: Optional Change Controller: IETF Value registry: [IANA.jose] Algorithms Algorithm Analysis Documents(s): [FIPS-204] Fifth, in the JSON Web Key Types registry also in the JSON Object Signing and Encryption (JOSE) registry group located at: https://www.iana.org/assignments/jose/ the following early allocation will be made permanent and its reference changed to [ RFC-to-be ]: "kty" Parameter Value: AKP Key Type Description: Algorithm Key Pair JOSE Implementation Requirements: Optional Change Controller: IETF Sixth, also in the JSON Web Key Parameters registry also in the JSON Object Signing and Encryption (JOSE) registry group located at: https://www.iana.org/assignments/jose/ the following two early allocations will be made permanent and their references changed to [ RFC-to-be ]: Parameter Name: pub Parameter Description: Public key Used with "kty" Value(s): AKP Parameter Information Class: Public Change Controller: IETF Specification Document(s): [ RFC-to-be ] Parameter Name: priv Parameter Description: Private key Used with "kty" Value(s): AKP Parameter Information Class: Private Change Controller: IETF Specification Document(s): [ RFC-to-be ] Please note that the priv early allocation in JSON Web Key Parameters is still pending expert approval for early registration of the corresponding COSE Key Type Parameter. This early allocation will be added and the document will be marked IANA OK after this review has been completed. We understand that these are the only actions required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2025-07-23
|
08 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
|
2025-07-15
|
08 | Tero Kivinen | Request for IETF Last Call review by SECDIR is assigned to Peter Yee |
|
2025-07-10
|
08 | Bo Wu | Request for IETF Last Call review by OPSDIR is assigned to Tirumaleswar Reddy.K |
|
2025-07-09
|
08 | Russ Housley | Request for IETF Last Call review by GENART Completed: Not Ready. Reviewer: Russ Housley. Sent review to list. |
|
2025-07-09
|
08 | Jean Mahoney | Request for IETF Last Call review by GENART is assigned to Russ Housley |
|
2025-07-08
|
08 | Mohamed Boucadair | Requested IETF Last Call review by OPSDIR |
|
2025-07-07
|
08 | Morgan Condie | IANA Review state changed to IANA - Review Needed |
|
2025-07-07
|
08 | Morgan Condie | The following Last Call announcement was sent out (ends 2025-07-28): From: The IESG To: IETF-Announce CC: cose-chairs@ietf.org, cose@ietf.org, draft-ietf-cose-dilithium@ietf.org, lucas.prabel@huawei.com, paul.wouters@aiven.io … The following Last Call announcement was sent out (ends 2025-07-28): From: The IESG To: IETF-Announce CC: cose-chairs@ietf.org, cose@ietf.org, draft-ietf-cose-dilithium@ietf.org, lucas.prabel@huawei.com, paul.wouters@aiven.io Reply-To: last-call@ietf.org Sender: Subject: Last Call: (ML-DSA for JOSE and COSE) to Proposed Standard The IESG has received a request from the CBOR Object Signing and Encryption WG (cose) to consider the following document: - 'ML-DSA for JOSE and COSE' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2025-07-28. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) serializations for Module- Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum Cryptography (PQC) digital signature scheme defined in FIPS 204. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-cose-dilithium/ No IPR declarations have been submitted directly on this I-D. |
|
2025-07-07
|
08 | Morgan Condie | IESG state changed to In Last Call from Last Call Requested |
|
2025-07-07
|
08 | Morgan Condie | Last call announcement was changed |
|
2025-07-07
|
08 | Morgan Condie | Last call announcement was generated |
|
2025-07-07
|
08 | Orie Steele | New version available: draft-ietf-cose-dilithium-08.txt |
|
2025-07-07
|
08 | (System) | New version approved |
|
2025-07-07
|
08 | (System) | Request for posting confirmation emailed to previous authors: Christine Cloostermans , Michael Osborne , Michael Prorock , Orie Steele , Rafael Misoczki , cose-chairs@ietf.org |
|
2025-07-07
|
08 | Orie Steele | Uploaded new revision |
|
2025-07-04
|
07 | Paul Wouters | Last call was requested |
|
2025-07-04
|
07 | Paul Wouters | Ballot approval text was generated |
|
2025-07-04
|
07 | Paul Wouters | Ballot writeup was generated |
|
2025-07-04
|
07 | Paul Wouters | IESG state changed to Last Call Requested from AD Evaluation |
|
2025-07-04
|
07 | Paul Wouters | Last call announcement was generated |
|
2025-06-12
|
07 | Orie Steele | New version available: draft-ietf-cose-dilithium-07.txt |
|
2025-06-12
|
07 | (System) | New version approved |
|
2025-06-12
|
07 | (System) | Request for posting confirmation emailed to previous authors: Christine Cloostermans , Michael Osborne , Michael Prorock , Orie Steele , Rafael Misoczki |
|
2025-06-12
|
07 | Orie Steele | Uploaded new revision |
|
2025-04-01
|
06 | Orie Steele | New version available: draft-ietf-cose-dilithium-06.txt |
|
2025-04-01
|
06 | Orie Steele | New version approved |
|
2025-04-01
|
06 | (System) | Request for posting confirmation emailed to previous authors: Christine Cloostermans , Michael Osborne , Michael Prorock , Orie Steele , Rafael Misoczki |
|
2025-04-01
|
06 | Orie Steele | Uploaded new revision |
|
2025-03-11
|
05 | Paul Wouters | IESG state changed to AD Evaluation from Publication Requested |
|
2025-01-28
|
05 | Michael Jones | ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? Extensive discussions occurred on the mailing list prior to the WGLC, and a few additional comments were received during the WGLC. The authors have revised the document to incorporate the feedback received, and it now appears to have achieved broad agreement. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Extended discussions took place on the mailing list concerning the appropriate “kty” value to define and use for ML-DSA. The solution of introducing the new Algorithm Key Pair (AKP) type seemed to gather working group support. Additionally, comments were made about the specification of the “context” string in ML-DSA, as well as the draft being too underspecified. The authors addressed these comments during the WGLC. Ultimately, none of the document updates encountered significant objections. No one spoke against the adoption of the document during the WGLC. Consequently, there was no particular controversy over specific points, nor were there significant difficulties in reaching consensus. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) I am not aware of any threatened appeals or extreme discontent. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? The examples in Appendix A were generated using code specifically written for the draft, as reported on the COSE mailing list (https://mailarchive.ietf.org/arch/msg/cose/_IbCQoSJeXFG-GDZFlJZnZHCP1U/). ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. The specification applies to both JOSE and COSE. Alignment with other working groups that are specifying ML-DSA algorithms, such as LAMPS, was raised as a point to consider during mailing list discussions. Additionally, it was noted as desirable to obtain confirmation from an independent implementation of the examples provided in Appendix A of the document. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No such criteria apply. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The document contains no YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document uses no formal language. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes, I believe the document is ready. Some nits can be addressed later in the process. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? Among the common Security Area issues, the document addresses the Threat Models and Security Environment aspect in its Security Considerations section. Most other Security Area concerns do not appear to be relevant. In particular, since the registered algorithms already exist, they do not fall under the "New Cryptography" category. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard is being requested. This status seems appropriate for this document, as it is the same status as the other COSE specifications that register algorithms. The document header is correct, while the "Intended RFC status" on the Datatracker needs to be updated. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. No IPR disclosures were issued against this document. I am not aware of any reminders about IPR disclosure being sent to the authors. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The idnits tool indicates multiple instances of too long lines in the document and some warnings that could be fixed later in the process. There are also one unused reference and one downref. Other nits: - Sections 8.1.4 and 8.1.5 should be subsections of the Section 8.1.3 "New COSE Key Type Parameters". Also, they should now be called "AKP Public Key" and "AKP Private Key", as it is the case with the "New JSON Web Key Parameters" Section for JOSE; - "the following key types in [IANA.jose]" --> key type; - "the security considerations of [...] applies" --> apply; - need to standardize the usage of capital letters in specific expressions (eg: "AKP Key" vs "AKP key"); - the document "CBOR Object Signing and Encryption (COSE) Key Thumbprint" is now an RFC and the name of the normative reference can be updated to "RFC9679". - need a comma after "When this key type is used" - "using th algorithms" --> the Otherwise, the document adheres to the Content Guidelines. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The Informational RFC 9053 is a normative reference, which seems appropriate. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? There is no such reference. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There is a normative downward reference to the Informational RFC 9053. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? There is no such reference. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Publication of this document will not change the status of any existing RFCs. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). Sections 8.1.4 and 8.1.5 should be subsections of the Section 8.1.3 "New COSE Key Type Parameters". Also, they should now be called "AKP Public Key" and "AKP Private Key", as it is the case with the "New JSON Web Key Parameters" Section for JOSE. The placeholders “Reference: RFC XXXX” and “Specification Document(s): RFC XXXX” in the IANA Considerations section will need to be updated. Otherwise, the IANA actions are clearly described and appropriate. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The specification does not create any new IANA registry; it only adds entries to existing registries. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2025-01-28
|
05 | Michael Jones | IETF WG state changed to Submitted to IESG for Publication from WG Document |
|
2025-01-28
|
05 | Michael Jones | IESG state changed to Publication Requested from I-D Exists |
|
2025-01-28
|
05 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
|
2025-01-28
|
05 | Michael Jones | Responsible AD changed to Paul Wouters |
|
2025-01-28
|
05 | Michael Jones | Document is now in IESG state Publication Requested |
|
2025-01-28
|
05 | Michael Jones | Changed consensus to Yes from Unknown |
|
2025-01-28
|
05 | Michael Jones | Intended Status changed to Proposed Standard from None |
|
2025-01-28
|
05 | Michael Jones | ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? Extensive discussions occurred on the mailing list prior to the WGLC, and a few additional comments were received during the WGLC. The authors have revised the document to incorporate the feedback received, and it now appears to have achieved broad agreement. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Extended discussions took place on the mailing list concerning the appropriate “kty” value to define and use for ML-DSA. The solution of introducing the new Algorithm Key Pair (AKP) type seemed to gather working group support. Additionally, comments were made about the specification of the “context” string in ML-DSA, as well as the draft being too underspecified. The authors addressed these comments during the WGLC. Ultimately, none of the document updates encountered significant objections. No one spoke against the adoption of the document during the WGLC. Consequently, there was no particular controversy over specific points, nor were there significant difficulties in reaching consensus. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) I am not aware of any threatened appeals or extreme discontent. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? The examples in Appendix A were generated using code specifically written for the draft, as reported on the COSE mailing list (https://mailarchive.ietf.org/arch/msg/cose/_IbCQoSJeXFG-GDZFlJZnZHCP1U/). ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. The specification applies to both JOSE and COSE. Alignment with other working groups that are specifying ML-DSA algorithms, such as LAMPS, was raised as a point to consider during mailing list discussions. Additionally, it was noted as desirable to obtain confirmation from an independent implementation of the examples provided in Appendix A of the document. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No such criteria apply. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The document contains no YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document uses no formal language. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes, I believe the document is ready. Some nits can be addressed later in the process. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? Among the common Security Area issues, the document addresses the Threat Models and Security Environment aspect in its Security Considerations section. Most other Security Area concerns do not appear to be relevant. In particular, since the registered algorithms already exist, they do not fall under the "New Cryptography" category. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard is being requested. This status seems appropriate for this document, as it is the same status as the other COSE specifications that register algorithms. The document header is correct, while the "Intended RFC status" on the Datatracker needs to be updated. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. No IPR disclosures were issued against this document. I am not aware of any reminders about IPR disclosure being sent to the authors. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The idnits tool indicates multiple instances of too long lines in the document and some warnings that could be fixed later in the process. There are also one unused reference and one downref. Other nits: - Sections 8.1.4 and 8.1.5 should be subsections of the Section 8.1.3 "New COSE Key Type Parameters". Also, they should now be called "AKP Public Key" and "AKP Private Key", as it is the case with the "New JSON Web Key Parameters" Section for JOSE; - "the following key types in [IANA.jose]" --> key type; - "the security considerations of [...] applies" --> apply; - need to standardize the usage of capital letters in specific expressions (eg: "AKP Key" vs "AKP key"); - the document "CBOR Object Signing and Encryption (COSE) Key Thumbprint" is now an RFC and the name of the normative reference can be updated to "RFC9679". - need a comma after "When this key type is used" - "using th algorithms" --> the Otherwise, the document adheres to the Content Guidelines. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The Informational RFC 9053 is a normative reference, which seems appropriate. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? There is no such reference. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There is a normative downward reference to the Informational RFC 9053. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? There is no such reference. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Publication of this document will not change the status of any existing RFCs. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). Sections 8.1.4 and 8.1.5 should be subsections of the Section 8.1.3 "New COSE Key Type Parameters". Also, they should now be called "AKP Public Key" and "AKP Private Key", as it is the case with the "New JSON Web Key Parameters" Section for JOSE. The placeholders “Reference: RFC XXXX” and “Specification Document(s): RFC XXXX” in the IANA Considerations section will need to be updated. Otherwise, the IANA actions are clearly described and appropriate. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The specification does not create any new IANA registry; it only adds entries to existing registries. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2025-01-15
|
05 | Michael Jones | Notification list changed to lucas.prabel@huawei.com because the document shepherd was set |
|
2025-01-15
|
05 | Michael Jones | Document shepherd changed to Lucas Prabel |
|
2024-12-18
|
05 | Orie Steele | New version available: draft-ietf-cose-dilithium-05.txt |
|
2024-12-18
|
05 | Orie Steele | New version approved |
|
2024-12-18
|
05 | (System) | Request for posting confirmation emailed to previous authors: Christine Cloostermans , Michael Osborne , Michael Prorock , Orie Steele , Rafael Misoczki |
|
2024-12-18
|
05 | Orie Steele | Uploaded new revision |
|
2024-10-20
|
04 | Michael Prorock | New version available: draft-ietf-cose-dilithium-04.txt |
|
2024-10-20
|
04 | Michael Prorock | New version approved |
|
2024-10-20
|
04 | (System) | Request for posting confirmation emailed to previous authors: Christine Cloostermans , Michael Osborne , Michael Prorock , Orie Steele , Rafael Misoczki |
|
2024-10-20
|
04 | Michael Prorock | Uploaded new revision |
|
2024-06-02
|
03 | Orie Steele | New version available: draft-ietf-cose-dilithium-03.txt |
|
2024-06-02
|
03 | Orie Steele | New version approved |
|
2024-06-02
|
03 | (System) | Request for posting confirmation emailed to previous authors: Christine Cloostermans , Michael Osborne , Michael Prorock , Orie Steele , Rafael Misoczki |
|
2024-06-02
|
03 | Orie Steele | Uploaded new revision |
|
2024-01-12
|
02 | Orie Steele | Changed document external resources from: github_repo https://github.com/mesur-io/post-quantum-signatures to: github_repo https://github.com/cose-wg/draft-ietf-cose-dilithium |
|
2024-01-12
|
02 | Orie Steele | New version available: draft-ietf-cose-dilithium-02.txt |
|
2024-01-12
|
02 | Orie Steele | New version approved |
|
2024-01-12
|
02 | (System) | Request for posting confirmation emailed to previous authors: Christine Cloostermans , Michael Osborne , Michael Prorock , Orie Steele , Rafael Misoczki |
|
2024-01-12
|
02 | Orie Steele | Uploaded new revision |
|
2024-01-10
|
01 | (System) | Document has expired |
|
2023-07-09
|
01 | Michael Prorock | New version available: draft-ietf-cose-dilithium-01.txt |
|
2023-07-09
|
01 | Michael Prorock | New version accepted (logged-in submitter: Michael Prorock) |
|
2023-07-09
|
01 | Michael Prorock | Uploaded new revision |
|
2023-03-12
|
00 | Michael Jones | Changed document external resources from: None to: github_repo https://github.com/mesur-io/post-quantum-signatures |
|
2023-03-12
|
00 | Michael Jones | This document now replaces draft-ietf-cose-post-quantum-signatures instead of None |
|
2023-03-12
|
00 | Michael Prorock | New version available: draft-ietf-cose-dilithium-00.txt |
|
2023-03-12
|
00 | Michael Jones | WG -00 approved |
|
2023-03-12
|
00 | Michael Prorock | Set submitter to "Michael Prorock ", replaces to draft-ietf-cose-post-quantum-signatures and sent approval email to group chairs: cose-chairs@ietf.org |
|
2023-03-12
|
00 | Michael Prorock | Uploaded new revision |