<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 4.0.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mott-cose-sqisign-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="cose-sqisign">CBOR Object Signing and Encryption (COSE) and
JSON Object Signing and Encryption (JOSE)
Registrations for SQIsign</title>

    <author initials="A. R." surname="Mott" fullname="Antony R. Mott">
      <organization>RustyKey</organization>
      <address>
        <email>antony@rustykey.io</email>
      </address>
    </author>

    <date year="2026" month="April" day="23"/>

    <area>SEC</area>
    <workgroup>COSE</workgroup>
    <keyword>post-quantum cryptography</keyword> <keyword>isogeny-based cryptography</keyword> <keyword>constrained devices</keyword> <keyword>IoT security</keyword>

    <abstract>


<?line 95?>

<t><strong>NOTE: This document describes a signature scheme based on an algorithm currently under evaluation in the NIST Post-Quantum Cryptography standardization process. Be aware that the underlying primitive may change as a result of that process.</strong></t>

<t>This document specifies the algorithm encodings and representations for the SQIsign digital signature scheme within the CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) frameworks.</t>

<t>SQIsign is an isogeny-based post-quantum signature scheme that provides the most compact signature and public key sizes of any candidate in the NIST Post-Quantum Cryptography (PQC) standardization and on-ramp-to-standardization processes.</t>

<t>The standardization of SQIsign is critical to addressing immediate infrastructure bottlenecks, specifically the FIDO2 CTAP2 specification used by an estimated 6.25 billion in-service devices and browser installations. CTAP2 enforces a 1024-byte default limit for external key communication. Most standardized post-quantum signatures exceed this limit, so cannot easily be deployed in these ecosystems without prohibitive protocol renegotiation, complex message fragmentation or hardware replacement. SQIsign-L1 signatures are small enough to enable delivery over highly constrained networks like 802.15.4 with minimal fragmentation.</t>

<t>This document clarifies that SQIsign's security relies on the general supersingular isogeny problem and is fundamentally unaffected by the torsion-point attacks that deprecated the SIDH/SIKE key exchange. By establishing stable COSE and JOSE identifiers, this document ensures the interoperability required for the seamless integration of post-quantum security into high-density, bandwidth-constrained, and legacy-compatible hardware environments.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mott-cose-sqisign/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        COSE Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/antonymott/quantum-resistant-rustykey"/>.</t>
    </note>


  </front>

  <middle>


<?line 107?>

<section anchor="introduction"><name>Introduction</name>

<t>This document registers algorithm identifiers and key type parameters for SQIsign in COSE and JOSE.</t>

<section anchor="background-and-motivation"><name>Background and Motivation</name>

<t>Post-quantum cryptography readiness is critical for constrained devices. As of 2026, while FIDO2/WebAuthn supports various COSE algorithms, hardware authenticators (like YubiKeys) and platform authenticators (like TPMs) have strict memory/storage constraints, effectively limiting public keys to 1024 bytes or less, hindering the adoption of large-key post-quantum algorithms.</t>

<section anchor="urgent-need-for-smaller-pqc-signatures"><name>Urgent Need for Smaller PQC Signatures</name>

<t>FN-DSA (Falcon) and ML-DSA (Dilithium) have larger signatures that may not fit in constrained environments.</t>

<t>The fundamental differences between ML-DSA, FN-DSA, and SQIsign lie in their underlying hard mathematical problems, implementation complexity, and performance trade-offs.</t>

<t>Falcon (NIST secondary) uses NTRU lattices to achieve very small signatures and fast verification, but requires complex floating-point math. Dilithium (NIST primary) is a balanced, high-efficiency lattice scheme using Module-LWE/SIS, easy to implement.</t>

<t>SQIsign <xref target="SQIsign-Spec"/> <xref target="SQIsign-Analysis"/> is a non-lattice, isogeny-based scheme (Short Quaternion and Isogeny Signature) that offers the smallest signature sizes but suffers from significantly slower signature generation where even vI may take seconds to minutes, or longer with WASM implementations for browsers of particular relevance to signatures required for WebAuthn PassKeys <xref target="WebAuthn-PQC-Signature-size-constraints"/>. SQIsign is an isogeny-based digital signature scheme participating in NIST's Round 2 Additional Digital Signature Schemes, not yet a NIST standard <xref target="NIST-Finalized-Standards"/>.</t>

<t>Speed: SQIsign is significantly slower at signing (roughly 100x to 1000x) compared to ML-DSA, though the math is changing fast and variants improve this.</t>

<texttable>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Public Key Size</ttcol>
      <ttcol align='left'>Signature Size</ttcol>
      <ttcol align='left'>PK + Sig Fits &lt; 1024?</ttcol>
      <c>ML-DSA-44</c>
      <c>1,312 bytes</c>
      <c>2,420 bytes</c>
      <c>❌</c>
      <c>ML-DSA-65</c>
      <c>1,952 bytes</c>
      <c>3,293 bytes</c>
      <c>❌</c>
      <c>ML-DSA-87</c>
      <c>2,592 bytes</c>
      <c>4,595 bytes</c>
      <c>❌</c>
      <c>FN-DSA-512</c>
      <c>897 bytes</c>
      <c>666 bytes</c>
      <c>❌ (1,563 total)</c>
      <c>FN-DSA-1024</c>
      <c>1,793 bytes</c>
      <c>1,280 bytes</c>
      <c>❌</c>
      <c>SQIsign-L1</c>
      <c>65 bytes</c>
      <c>148 bytes</c>
      <c>✅ (213 total)</c>
      <c>SQIsign-L3</c>
      <c>97 bytes</c>
      <c>224 bytes</c>
      <c>✅ (321 total)</c>
      <c>SQIsign-L5</c>
      <c>129 bytes</c>
      <c>292 bytes</c>
      <c>✅ (421 total)</c>
</texttable>

</section>
<section anchor="estimated-constrained-device-footprint"><name>Estimated Constrained Device Footprint</name>

<t>The total addressable market for SQIsign in constrained devices is estimated at ~6.25 billion units.</t>

<section anchor="device-category-breakdown"><name>Device Category Breakdown</name>

<section anchor="legacy-hardware-security-keys-120-150-million"><name>Legacy Hardware Security Keys: ~120 - 150 million</name>
<t><list style="symbols">
  <t>YubiKeys in Service: Based on Yubico’s historical growth and preliminary 2026 financial estimates, there are approximately
80 million legacy YubiKeys in active circulation (Series 5 and older). While firmware 5.7+ introduced some PQC readiness,
older keys cannot be updated to increase buffer sizes - Other Vendors: Competitors (Google Titan, Feitian, Thales) contribute another 40–50 million active legacy keys</t>
</list></t>

</section>
<section anchor="constrained-tpms-and-platform-modules-11-billion"><name>Constrained TPMs and Platform Modules: ~1.1 billion</name>
<t>Trusted Platform Modules (TPMs) are integrated into PCs and servers, but their WebAuthn implementation often inherits protocol-level constraints. Estimated ~2.5 billion active chips worldwide. Constrained Subset: We estimate ~1.1 billion of these are in older Windows 10/11 or Linux machines where the OS "virtual authenticator" or TPM driver still enforces the 1024-byte message default to maintain backward compatibility with external CTAP1/2 tools.</t>

</section>
<section anchor="browser-and-software-implementations-5-billion"><name>Browser and Software Implementations: ~5 billion</name>
<t>This category refers to the "User-Agent" layer that mediates between the web and the hardware.
Global Browser Agents: There are over 5 billion active browser instances across mobile and desktop (Chrome, Safari, Edge, Firefox). Legacy Protocols: Even on modern hardware, browsers often use the FIDO2 CTAP2 specification which, unless explicitly negotiated for larger messages, maintains a 1024-byte default for external key communication.</t>

</section>
<section anchor="critical-infrastructure-300-million-includes-energy-electric-nuclear-oil-gas-water-wastewater-transportation-systems-communications-government-emergency-services-healthcare-and-financial-services"><name>Critical Infrastructure: ~300 Million includes Energy (electric, nuclear, oil, gas), Water &amp; Wastewater, Transportation Systems, Communications, Government, Emergency Services, Healthcare and Financial Services</name>
<t>Industrial/Government: Agencies like the U.S. Department of Defense rely on high-security FIPS-certified keys that are notoriously slow to upgrade. We estimate ~50 million "frozen" government keys. IoT Security: Of the 21.9 billion connected IoT devices in 2026, only a fraction use WebAuthn. However, for those that do (smart locks, secure gateways), approximately 250 million are estimated to use older, non-upgradable secure elements limited to 1024-byte payloads. Recent government-level initiatives highlight the necessity to "...effectively deprecate the use of RSA, Diffie-Hellman (DH), and elliptic curve cryptography (ECDH and ECDSA) when mandated." <xref target="CNSA-2"/>, Page 4.</t>

</section>
</section>
</section>
<section anchor="urgency-limit-or-stop-harvest-now-decrypt-later-attacks"><name>Urgency: Limit or Stop 'Harvest now; decrypt later' Attacks</name>
<t>Adversaries are collecting encrypted data today to decrypt when quantum computers become available. The transition to post-quantum cryptography (PQC) is critical for ensuring long-term security of digital communications against adversaries equipped with large-scale quantum computers. The National Institute of Standards and Technology (NIST) has been leading standardization efforts, having selected initial PQC algorithms and continuing to evaluate additional candidates.</t>

<t>CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/> is specifically designed for constrained node networks and IoT environments where bandwidth, storage, and computational resources are limited. The compact nature of SQIsign makes it an ideal candidate for COSE deployments.</t>

</section>
</section>
<section anchor="scope-and-status"><name>Scope and Status</name>

<t>This document is published on the <strong>Standards</strong> track rather than Informational Track for the following reasons:</t>

<t><list style="numbers" type="1">
  <t><strong>Algorithm Maturity</strong>: SQIsign is currently undergoing evaluation in NIST's on-ramp process</t>
  <t><strong>Continued Cryptanalysis</strong>: The algorithm has active ongoing review by the cryptographic research community, including the IRTF CFRG</t>
  <t><strong>High anticipated demand</strong>: This specification enables experimentation and early deployment to gather implementation experience</t>
</list></t>

<t><strong>This document does not represent Working Group consensus on algorithm innovation.</strong> The COSE and JOSE working groups focus on algorithm <em>integration</em> and <em>encoding</em>, not cryptographic algorithm design. The cryptographic properties of SQIsign are being evaluated through NIST's process and academic peer review.</t>

</section>
<section anchor="relationship-to-other-work"><name>Relationship to Other Work</name>

<t>This document follows the precedent established by <xref target="I-D.ietf-cose-falcon"/> and <xref target="I-D.ietf-cose-dilithium"/> for integrating NIST PQC candidate algorithms into COSE and JOSE. The structure and approach are intentionally aligned to provide consistency across post-quantum signature scheme integrations.</t>

</section>
<section anchor="constrained-device-applicability"><name>Constrained Device Applicability</name>
<t>SQIsign is particularly attractive for:</t>

<t><list style="symbols">
  <t><strong>IoT sensors</strong> with limited flash memory</t>
  <t><strong>Firmware updates</strong> over low-bandwidth networks (LoRaWAN, NB-IoT)</t>
  <t><strong>Embedded certificates</strong> in constrained devices</t>
  <t><strong>Blockchain and DLT</strong> where transaction size affects fees</t>
  <t><strong>Satellite communications</strong> with bandwidth constraints</t>
</list></t>

</section>
</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>This document uses the following terms:</t>

<t><list style="symbols">
  <t><strong>PQC</strong>: Post-Quantum Cryptography</t>
  <t><strong>COSE</strong>: CBOR Object Signing and Encryption</t>
  <t><strong>JOSE</strong>: JSON Object Signing and Encryption</t>
  <t><strong>JWS</strong>: JSON Web Signature</t>
  <t><strong>JWK</strong>: JSON Web Key</t>
  <t><strong>CBOR</strong>: Concise Binary Object Representation <xref target="RFC7049"/></t>
  <t><strong>ECDH</strong>: Elliptic Curve Diffie-Hellman</t>
  <t><strong>IANA</strong>: Internet Assigned Numbers Authority</t>
</list></t>

</section>
<section anchor="sqisign-algorithm-overview"><name>SQIsign Algorithm Overview</name>

<section anchor="cryptographic-foundation"><name>Cryptographic Foundation</name>

<t>SQIsign is based on the hardness of finding isogenies between supersingular elliptic curves over finite fields. The security assumption relies on:</t>

<t><list style="numbers" type="1">
  <t>The difficulty of the <strong>Isogeny Path Problem</strong></t>
  <t>The quaternion-based key generation providing computational hardness equivalent to quantum-resistant assumptions</t>
</list></t>

<t>Unlike lattice-based schemes, isogeny-based cryptography offers:</t>

<t><list style="symbols">
  <t><strong>Smaller key and signature sizes</strong></t>
  <t><strong>Algebraic structure</strong> based on elliptic curve isogenies</t>
  <t><strong>Different security assumptions</strong> (diversification from lattice-based schemes)</t>
</list></t>

</section>
<section anchor="security-levels"><name>Security Levels</name>

<t>SQIsign is defined with three parameter sets corresponding to NIST security levels:</t>

<texttable>
      <ttcol align='left'>Parameter Set</ttcol>
      <ttcol align='left'>NIST Level</ttcol>
      <ttcol align='left'>Public Key</ttcol>
      <ttcol align='left'>Signature</ttcol>
      <ttcol align='left'>Classical Sec</ttcol>
      <c>SQIsign-L1</c>
      <c>I</c>
      <c>65 bytes</c>
      <c>148 bytes</c>
      <c>~128 bits</c>
      <c>SQIsign-L3</c>
      <c>III</c>
      <c>97 bytes</c>
      <c>224 bytes</c>
      <c>~192 bits</c>
      <c>SQIsign-L5</c>
      <c>V</c>
      <c>129 bytes</c>
      <c>292 bytes</c>
      <c>~256 bits</c>
</texttable>

</section>
<section anchor="performance-characteristics"><name>Performance Characteristics</name>

<t><list style="symbols">
  <t><strong>Signing</strong>: Computationally intensive (slower than lattice schemes)</t>
  <t><strong>Verification</strong>: Moderate computational cost</t>
  <t><strong>Key Generation</strong>: Intensive computation required</t>
  <t><strong>Size</strong>: Exceptional efficiency (10 - 20x smaller than lattice alternatives)</t>
</list></t>

<t><strong>Recommended Use Cases:</strong>
- Sign-once, verify-many scenarios (firmware, certificates)
- Bandwidth-constrained environments
- Storage-limited devices
- Applications where signature/key size dominates performance considerations</t>

</section>
</section>
<section anchor="cose-integration"><name>COSE Integration</name>

<t>This section defines the identifiers for SQIsign in COSE <xref target="RFC8152"/>.</t>

<section anchor="sqisign-algorithms"><name>SQIsign Algorithms</name>

<t>The algorithms defined in this document are:</t>

<t><list style="symbols">
  <t>SQIsign-L1: SQIsign NIST Level I (suggested value -61)</t>
  <t>SQIsign-L3: SQIsign NIST Level III (suggested value -62)</t>
  <t>SQIsign-L5: SQIsign NIST Level V (suggested value -63)</t>
</list></t>

</section>
<section anchor="sqisign-key-types"><name>SQIsign Key Types</name>

<t>A new key type is defined for SQIsign with the name "SQIsign".</t>

</section>
<section anchor="sqisign-key-parameters"><name>SQIsign Key Parameters</name>

<t>SQIsign keys use the following COSE Key common parameters:</t>

<texttable>
      <ttcol align='left'>Key Parameter</ttcol>
      <ttcol align='left'>COSE Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>kty</c>
      <c>1</c>
      <c>int</c>
      <c>Key type: IETF (SQIsign)</c>
      <c>kid</c>
      <c>2</c>
      <c>bstr</c>
      <c>Key ID (optional)</c>
      <c>alg</c>
      <c>3</c>
      <c>int</c>
      <c>Algorithm identifier (-61, -62, or -63)</c>
      <c>key_ops</c>
      <c>4</c>
      <c>array</c>
      <c>Key operations (<spanx style="verb">sign</spanx>, <spanx style="verb">verify</spanx>)</c>
</texttable>

</section>
<section anchor="sqisign-specific-key-parameters"><name>SQIsign-Specific Key Parameters</name>

<texttable>
      <ttcol align='left'>Key Parameter</ttcol>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>pub</c>
      <c>-1</c>
      <c>bstr</c>
      <c>SQIsign public key</c>
      <c>priv</c>
      <c>-2</c>
      <c>bstr</c>
      <c>SQIsign private key (sensitive)</c>
</texttable>

</section>
<section anchor="cose-key-format-examples"><name>COSE Key Format Examples</name>

<section anchor="public-key-cosekey"><name>Public Key (COSE_Key)</name>

<t><spanx style="verb">cbor
{
  1: IETF,              / kty: SQIsign /
  3: -61,              / alg: SQIsign-L1 /
  -1: h'[PUBLIC_KEY]'  / pub: SQIsign public key bytes /
}
</spanx></t>

</section>
<section anchor="private-key-cosekey"><name>Private Key (COSE_Key)</name>

<t><spanx style="verb">cbor
{
  1: IETF,               / kty: SQIsign /
  3: -61,               / alg: SQIsign-L1 /
  -1: h'[PUBLIC_KEY]',  / pub: SQIsign public key bytes /
  -2: h'[PRIVATE_KEY]'  / priv: SQIsign private key bytes /
}
</spanx></t>

</section>
</section>
<section anchor="cose-signature-format"><name>COSE Signature Format</name>

<t>SQIsign signatures in COSE follow the standard COSE_Sign1 structure <xref target="RFC9052"/>:</t>

<t><spanx style="verb">
COSE_Sign1 = [
    protected: bstr .cbor header_map,
    unprotected: header_map,
    payload: bstr / nil,
    signature: bstr
]
</spanx></t>

<t>The <spanx style="verb">signature</spanx> field contains the raw SQIsign signature bytes.</t>

<section anchor="protected-headers"><name>Protected Headers</name>

<t>The protected header <bcp14>MUST</bcp14> include:</t>

<t><spanx style="verb">cbor
{
  1: -61  / alg: SQIsign-L1, -62 for L3, -63 for L5 /
}
</spanx></t>

</section>
<section anchor="example-cosesign1-structure"><name>Example COSE_Sign1 Structure</name>

<t><spanx style="verb">cbor
18(                                  / COSE_Sign1 tag /
  [
    h'A10139003C',                   / protected: {"alg": -61} /
    {},                              / unprotected /
    h'546869732069732074686520636F6E74656E742E', / payload /
    h'[SQISIGN_SIGNATURE_BYTES]'     / signature /
  ]
)
</spanx></t>

</section>
</section>
</section>
<section anchor="jose-integration"><name>JOSE Integration</name>

<section anchor="json-web-signature-jws-algorithm-registration"><name>JSON Web Signature (JWS) Algorithm Registration</name>

<t>The following algorithm identifiers are registered for use in the JWS "alg" header parameter for JSON Web Signatures <xref target="RFC7515"/>:</t>

<texttable>
      <ttcol align='left'>Algorithm Name</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Implementation Requirements</ttcol>
      <c>SQIsign-L1</c>
      <c>SQIsign NIST Level I</c>
      <c>Optional</c>
      <c>SQIsign-L3</c>
      <c>SQIsign NIST Level III</c>
      <c>Optional</c>
      <c>SQIsign-L5</c>
      <c>SQIsign NIST Level V</c>
      <c>Optional</c>
</texttable>

</section>
<section anchor="json-web-key-jwk-representation"><name>JSON Web Key (JWK) Representation</name>

<t>SQIsign keys are represented in JWK <xref target="RFC7517"/> format as follows:</t>

<section anchor="public-key-parameters"><name>Public Key Parameters</name>

<texttable>
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>kty</c>
      <c>string</c>
      <c>Key type: "SQIsign"</c>
      <c>alg</c>
      <c>string</c>
      <c>Algorithm: "SQIsign-L1", "SQIsign-L3", or "SQIsign-L5"</c>
      <c>pub</c>
      <c>string</c>
      <c>Base64url-encoded public key</c>
      <c>kid</c>
      <c>string</c>
      <c>Key ID (optional)</c>
      <c>use</c>
      <c>string</c>
      <c>Public key use: "sig" (optional)</c>
      <c>key_ops</c>
      <c>array</c>
      <c>Key operations: [verify] (optional)</c>
</texttable>

</section>
<section anchor="private-key-parameters"><name>Private Key Parameters</name>

<t>Private keys include all public key parameters plus:</t>

<texttable>
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>priv</c>
      <c>string</c>
      <c>Base64url-encoded private key</c>
</texttable>

</section>
</section>
<section anchor="jwk-examples"><name>JWK Examples</name>

<section anchor="public-key-jwk-example"><name>Public Key (JWK) Example</name>

<t><spanx style="verb">json
{
  "kty": "SQIsign",
  "alg": "SQIsign-L1",
  "pub": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_\
    5xZuqgMwkaeJhM94YHi_-2UsQllbnmm-W4XFSLm2hUwiMylrAh0",
  "kid": "2027-01-device-key",
  "use": "sig",
  "key_ops": ["verify"]
}
</spanx></t>

</section>
<section anchor="private-key-jwk-example"><name>Private Key (JWK) Example</name>

<t><spanx style="verb">json
{
  "kty": "SQIsign",
  "alg": "SQIsign-L1",
  "pub": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_\
    5xZuqgMwkaeJhM94YHi_-2UsQllbnmm-W4XFSLm2hUwiMylrAh0",
  "priv": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_5xZuqgMwkaeJhM94YHi_\
    -2UsQllbnmm-W4XFSLm2hUwiMylrAh1VwP9vNkBZH0Bjj2wc-\
    p7sUgQAAAAAAAAAAAAAAAAAAN68tviJbcCpQ84fh-4IJB4-\
    ____________________P38m3fKOhfhMspQU9GmA4CD5___\
    _______________________________________________\
    ___________wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\
    AAAAAAA5cP9aha40v-8mFd_bdAgpR93Ug2iPhu4_NxG97C7\
    8wBvVMGOrQTCli7NxrR2KlPZR1AC5VddGf4p-ZjCzrWfAJv\
    xhEh4uOKXq1MmuS9TwZGuz1YIYMIguu1wqjdmfaQAfOmK2g\
    WWO3vcld5s7GR2AcrTv65ocK_pVUWY8eJDcQA",
  "kid": "2027-01-device-key",
  "use": "sig",
  "key_ops": ["sign"]
}
</spanx></t>

</section>
</section>
<section anchor="jws-compact-serialization"><name>JWS Compact Serialization</name>

<t>A JWS using SQIsign follows the standard compact serialization:</t>

<t><spanx style="verb">
BASE64URL(UTF8(JWS Protected Header)) || '.' ||
BASE64URL(JWS Payload) || '.' ||
BASE64URL(JWS Signature)
</spanx></t>

<section anchor="example-jws-protected-header"><name>Example JWS Protected Header</name>

<t><spanx style="verb">json
{
  "alg": "SQIsign-L1",
  "typ": "JWT"
}
</spanx></t>

<t>Base64url-encoded: <spanx style="verb">eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0</spanx></t>

</section>
<section anchor="complete-jws-example"><name>Complete JWS Example</name>

<t><spanx style="verb">
eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0
.
[BASE64URL_PAYLOAD]
.
[BASE64URL_SQISIGN_SIGNATURE]
</spanx></t>

</section>
</section>
</section>
<section anchor="implementation-considerations"><name>Implementation Considerations</name>

<section anchor="signature-and-key-generation"><name>Signature and Key Generation</name>

<t>Implementations <bcp14>MUST</bcp14> follow the SQIsign specification <xref target="SQIsign-Spec"/> for:</t>

<t><list style="symbols">
  <t>Key pair generation</t>
  <t>Signature generation</t>
  <t>Signature verification</t>
</list></t>

</section>
<section anchor="randomness-requirements"><name>Randomness Requirements</name>

<t>SQIsign signature generation requires high-quality randomness. Implementations <bcp14>MUST</bcp14> use a cryptographically secure random number generator (CSRNG) compliant with <xref target="RFC4086"/> or equivalent.</t>

</section>
<section anchor="side-channel-protections"><name>Side-Channel Protections</name>

<t>Implementations <bcp14>SHOULD</bcp14> implement protections against:</t>

<t><list style="symbols">
  <t>Timing attacks</t>
  <t>Power analysis</t>
  <t>Fault injection attacks</t>
</list></t>

<t>Particularly for constrained devices deployed in physically accessible environments.</t>

</section>
<section anchor="performance-trade-offs"><name>Performance Trade-offs</name>

<t>Implementers should be aware:</t>

<t><list style="symbols">
  <t><strong>Signing is computationally expensive</strong>: Consider pre-signing or batch operations</t>
  <t><strong>Verification is moderate</strong>: Suitable for resource-constrained verifiers</t>
  <t><strong>Size is exceptional</strong>: Minimizes bandwidth and storage</t>
</list></t>

</section>
<section anchor="interoperability-testing"><name>Interoperability Testing</name>

<t>Early implementations <bcp14>SHOULD</bcp14> participate in interoperability testing to ensure:</t>

<t><list style="symbols">
  <t>Consistent signature generation and verification</t>
  <t>Proper encoding in COSE and JOSE formats</t>
  <t>Cross-platform compatibility</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="algorithm-security"><name>Algorithm Security</name>

<t>The security of SQIsign relies on:</t>

<t><list style="numbers" type="1">
  <t>The hardness of finding isogenies between supersingular elliptic curves</t>
  <t>The computational difficulty of solving quaternion-based problems</t>
</list></t>

<t>These assumptions are <strong>different from lattice-based schemes</strong>, providing cryptographic diversity in the post-quantum landscape.</t>

</section>
<section anchor="quantum-security"><name>Quantum Security</name>

<t>SQIsign is designed to resist attacks by large-scale quantum computers. The three parameter sets provide security equivalent to AES-128, AES-192, and AES-256 against both classical and quantum adversaries.</t>

</section>
<section anchor="current-cryptanalysis-status"><name>Current Cryptanalysis Status</name>

<t>As of this writing, SQIsign is undergoing active cryptanalytic review:</t>

<t><list style="symbols">
  <t><strong>NIST Round 2 evaluation</strong>: <xref target="NIST-Finalized-Standards"/></t>
  <t><strong>Academic research</strong>: Ongoing analysis of isogeny-based cryptography</t>
  <t><strong>Known attacks</strong>: No practical breaks of the security assumptions</t>
</list></t>

<t><strong>Implementers are advised</strong>:
- Monitor NIST announcements and updates
- Follow academic literature on isogeny cryptanalysis
- Be prepared to deprecate or update as cryptanalysis evolves</t>

</section>
<section anchor="implementation-security"><name>Implementation Security</name>

<section anchor="random-number-generation"><name>Random Number Generation</name>

<t>Poor randomness can completely compromise SQIsign security. Implementations <bcp14>MUST</bcp14> use robust CSRNGs, especially on constrained devices with limited entropy sources.</t>

</section>
<section anchor="side-channel-resistance"><name>Side-Channel Resistance</name>

<t>Constrained devices may be physically accessible to attackers. Implementations <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Use constant-time algorithms where possible</t>
  <t>Implement countermeasures against DPA/SPA</t>
  <t>Consider fault attack mitigations</t>
</list></t>

</section>
<section anchor="key-management"><name>Key Management</name>

<t><list style="symbols">
  <t>Private keys <bcp14>MUST</bcp14> be protected with appropriate access controls</t>
  <t>Consider hardware security modules (HSMs) or secure elements for key storage</t>
  <t>Implement key rotation policies appropriate to the deployment</t>
</list></t>

</section>
</section>
<section anchor="cryptographic-agility"><name>Cryptographic Agility</name>

<t>Organizations deploying SQIsign <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Maintain hybrid deployments with classical algorithms during transition</t>
  <t>Plan for algorithm migration if cryptanalysis reveals weaknesses</t>
  <t>Monitor NIST and IRTF guidance on PQC deployment</t>
</list></t>

</section>
<section anchor="constrained-device-specific-risks"><name>Constrained Device Specific Risks</name>

<t>IoT devices face unique challenges:</t>

<t><list style="symbols">
  <t><strong>Physical access</strong>: Devices may be deployed in hostile environments</t>
  <t><strong>Limited update capability</strong>: Firmware updates may be infrequent or impossible</t>
  <t><strong>Long deployment lifetimes</strong>: Devices may operate for 10+ years</t>
</list></t>

<t>Design systems with:
- Defense in depth (multiple security layers)
- Remote update capability when possible
- Graceful degradation if algorithm is compromised</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<t>IANA is requested to add the following entries to the COSE and JOSE registries. The following completed registration actions are provided as described in <xref target="RFC9053"/> and <xref target="RFC9054"/>.</t>

<section anchor="new-cose-algorithms"><name>New COSE Algorithms</name>

<t>IANA is requested to register the following entries in the "COSE Algorithms" registry:</t>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Capabilities</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <ttcol align='left'>Rec'd</ttcol>
      <c>SQIsign-L1</c>
      <c>-61</c>
      <c>SQIsign NIST L I</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L3</c>
      <c>-62</c>
      <c>SQIsign NIST L III</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L5</c>
      <c>-63</c>
      <c>SQIsign NIST L V</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
</texttable>

</section>
<section anchor="new-cose-key-types"><name>New COSE Key Types</name>

<t>IANA is requested to register the following entry in the "COSE Key Types" registry:</t>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Capabilities</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>SQIsign pub key</c>
      <c>sign, verify</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-cose-key-type-parameters"><name>New COSE Key Type Parameters</name>

<t>IANA is requested to register the following entries in the "COSE Key Type Parameters" registry:</t>

<texttable>
      <ttcol align='left'>Key Type</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SQIsign</c>
      <c>pub</c>
      <c>-1</c>
      <c>bstr</c>
      <c>Public key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>SQIsign</c>
      <c>priv</c>
      <c>-2</c>
      <c>bstr</c>
      <c>Private key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-jws-algorithms"><name>New JWS Algorithms</name>

<t>IANA is requested to register the following entries in the "JSON Web Signature and Encryption Algorithms" registry:</t>

<texttable>
      <ttcol align='left'>Algorithm Name</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Impl Req</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <c>SQIsign-L1</c>
      <c>SQIsign NIST L I</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L3</c>
      <c>SQIsign NIST L III</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L5</c>
      <c>SQIsign NIST L V</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
</texttable>

</section>
<section anchor="new-json-web-key-types"><name>New JSON Web Key Types</name>

<t>IANA is requested to register the following entry in the "JSON Web Key Types" registry:</t>

<texttable>
      <ttcol align='left'>"kty" Param Value</ttcol>
      <ttcol align='left'>Key Type Desc</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SQIsign</c>
      <c>SQIsign public key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-json-web-key-parameters"><name>New JSON Web Key Parameters</name>

<t>IANA is requested to register the following entries in the "JSON Web Key Parameters" registry:</t>

<texttable>
      <ttcol align='left'>Param Name</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Used with "kty" Val</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>pub</c>
      <c>Public key</c>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>priv</c>
      <c>Private key</c>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank:</t>

<t><list style="symbols">
  <t>The SQIsign design team (De Feo, Kohel, Leroux, Petit, Wesolowski) for their groundbreaking work on isogeny-based signatures</t>
  <t>The NIST PQC team for managing the standardization process</t>
  <t>The COSE and JOSE working groups for guidance on integration</t>
  <t>The IRTF Crypto Forum Research Group for ongoing cryptanalytic review</t>
  <t>Early implementers who provide valuable feedback</t>
</list></t>

<t>This work builds upon the template established by <xref target="I-D.ietf-cose-falcon"/> and similar PQC integration efforts.</t>

</section>
<section anchor="references"><name>References</name>

<section anchor="normative-references"><name>Normative References</name>

<t><em>Populated automatically from metadata</em></t>

</section>
<section anchor="informative-references"><name>Informative References</name>

<t><em>Populated automatically from metadata</em></t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC7515">
  <front>
    <title>JSON Web Signature (JWS)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7515"/>
  <seriesInfo name="DOI" value="10.17487/RFC7515"/>
</reference>
<reference anchor="RFC7517">
  <front>
    <title>JSON Web Key (JWK)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7517"/>
  <seriesInfo name="DOI" value="10.17487/RFC7517"/>
</reference>
<reference anchor="RFC8152">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8152"/>
  <seriesInfo name="DOI" value="10.17487/RFC8152"/>
</reference>
<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>
<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>
<reference anchor="RFC9054">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9054"/>
  <seriesInfo name="DOI" value="10.17487/RFC9054"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4086">
  <front>
    <title>Randomness Requirements for Security</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="J. Schiller" initials="J." surname="Schiller"/>
    <author fullname="S. Crocker" initials="S." surname="Crocker"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
      <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="106"/>
  <seriesInfo name="RFC" value="4086"/>
  <seriesInfo name="DOI" value="10.17487/RFC4086"/>
</reference>
<reference anchor="RFC7049">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7049"/>
  <seriesInfo name="DOI" value="10.17487/RFC7049"/>
</reference>

<reference anchor="I-D.ietf-cose-falcon">
   <front>
      <title>FN-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>mesur.io</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Tradeverifyd</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of the Bundeswehr Munich</organization>
      </author>
      <date day="15" month="March" year="2026"/>
      <abstract>
	 <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for FFT
   (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature
   Algorithm (FN-DSA), a Post-Quantum Cryptography (PQC) digital
   signature scheme defined in US NIST FIPS 206 (expected to be
   published in late 2026 early 2027).

   It does not define new cryptographic primitives; rather, it specifies
   how existing FN-DSA mechanisms are serialized for use in JOSE and
   COSE.  This document registers signature algorithms for JOSE and
   COSE, specifically FN-DSA-512 and FN-DSA-1024.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-falcon-04"/>
   
</reference>

<reference anchor="I-D.ietf-cose-dilithium">
   <front>
      <title>ML-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>Tradeverifyd</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Tradeverifyd</organization>
      </author>
      <date day="15" month="November" year="2025"/>
      <abstract>
	 <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
   
</reference>

<reference anchor="SQIsign-Spec" target="https://sqisign.org/spec/sqisign-20250205.pdf">
  <front>
    <title>SQIsign: Compact Post-Quantum Signatures from Quaternions and Isogenies (Round 2)</title>
    <author initials="L." surname="De Feo">
      <organization></organization>
    </author>
    <author initials="D." surname="Kohel">
      <organization></organization>
    </author>
    <author initials="A." surname="Leroux">
      <organization></organization>
    </author>
    <author initials="C." surname="Petit">
      <organization></organization>
    </author>
    <author initials="B." surname="Wesolowski">
      <organization></organization>
    </author>
    <date year="2025" month="February"/>
  </front>
</reference>
<reference anchor="NIST-Finalized-Standards" target="https://www.nist.gov/news-events/news/2024/08/
nist-releases-first-3-finalized-post-quantum-encryption-standards
">
  <front>
    <title>"NIST Releases First 3 Finalized
Post-Quantum Encryption Standards"</title>
    <author >
      <organization>NIST</organization>
    </author>
    <date year="2024" month="August"/>
  </front>
</reference>
<reference anchor="SQIsign-Analysis" target="https://eprint.iacr.org/2020/1240">
  <front>
    <title>"SQIsign: Compact Post-Quantum Signatures
from Quaternions and Isogenies"</title>
    <author >
      <organization>IACR ePrint Archive</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="CNSA-2" target="https://media.defense.gov/2025/May/30/
2003728741/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS.PDF
">
  <front>
    <title>Commercial National Security Algorithm Suite 2.0</title>
    <author >
      <organization>National Security Agency</organization>
    </author>
    <date year="2025" month="May"/>
  </front>
</reference>
<reference anchor="WebAuthn-PQC-Signature-size-constraints" target="https://www.npmjs.com/package/quantum-resistant-rustykey">
  <front>
    <title>WebAuthn PQC Signature size constraints</title>
    <author >
      <organization>University of Quantum Science</organization>
    </author>
    <date year="2026" month="April"/>
  </front>
</reference>


    </references>

</references>


<?line 652?>

<section anchor="test-vectors"><name>Test Vectors</name>

<section anchor="sqisign-l1-test-vectors"><name>SQIsign-L1 Test Vectors</name>

<section anchor="example-1-simple-message-signing"><name>Example 1: Simple Message Signing</name>

<t>The following test vector exhibits a SQIsign Level I signature over a short message.</t>

<t>Message (hex): <spanx style="verb">d81c4d8d734fcbfbeade3d3f8a039faa2a2c9957e835ad55b2 \
2e75bf57bb556ac8</spanx>
Message (ASCII): <spanx style="verb">MsO=?*,W5U.uWUj</spanx></t>

<t>Public Key (hex): <spanx style="verb">07CCD21425136F6E865E497D2D4D208F0054AD81372066E \
817480787AAF7B2029550C89E892D618CE3230F23510BFBE68FCCDDAEA51DB1436 \
B462ADFAF008A010B</spanx>
Public Key (Base64url): <spanx style="verb">B8zSFCUTb26GXkl9LU0gjwBUrYE3IGboF0gHh6r3s \
gKVUMieiS1hjOMjDyNRC_vmj8zdrqUdsUNrRirfrwCKAQs</spanx></t>

<t>Signature (hex): <spanx style="verb">84228651f271b0f39f2f19f2e8718f31ed3365ac9e5cb303 \
afe663d0cfc11f0455d891b0ca6c7e653f9ba2667730bb77befe1b1a3182840428 \
4af8fd7baacc010001d974b5ca671ff65708d8b462a5a84a1443ee9b5fed721876 \
7c9d85ceed04db0a69a2f6ec3be835b3b2624b9a0df68837ad00bcacc27d1ec806 \
a44840267471d86eff3447018adb0a6551ee8322ab30010202</spanx>
Signature (Base64url): <spanx style="verb">hCKGUfJxsPOfLxny6HGPMe0zZayeXLMDr-Zj0M_BHw \
RV2JGwymx-ZT-bomZ3MLt3vv4bGjGChAQoSvj9e6rMAQAB2XS1ymcf9lcI2LRipahK \
FEPum1_tchh2fJ2Fzu0E2wppovbsO-g1s7JiS5oN9og3rQC8rMJ9HsgGpEhAJnRx2G \
7_NEcBitsKZVHugyKrMAECAg</spanx></t>

</section>
<section anchor="cosesign1-complete-example"><name>COSE_Sign1 Complete Example</name>

<t><spanx style="verb">cbor
18(
  [
    h'a10139003c', / protected: {"alg": -61} /
    {},           / unprotected /
    h'd81c4d8d734fcbfbeade3d3f8a039faa2a2c9957e835ad55b22e75bf57bb \
    556ac8', / payload /
    h'84228651f271b0f39f2f19f2e8718f31ed3365ac9e5cb303afe663d0cfc1 \
    1f0455d891b0ca6c7e653f9ba2667730bb77befe1b1a31828404284af8fd7b \
    aacc010001d974b5ca671ff65708d8b462a5a84a1443ee9b5fed7218767c9d \
    85ceed04db0a69a2f6ec3be835b3b2624b9a0df68837ad00bcacc27d1ec806 \
    a44840267471d86eff3447018adb0a6551ee8322ab30010202'
  ]
)
</spanx></t>

</section>
<section anchor="jws-complete-example"><name>JWS Complete Example</name>

<t><spanx style="verb">
eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0
.
2BxNjXNPy_vq3j0_igOfqiosmVfoNa1Vsi51v1e7VWrI
.
hCKGUfJxsPOfLxny6HGPMe0zZayeXLMDr-Zj0M_BHwRV2JGwymx-ZT-bomZ3MLt3vv \
4bGjGChAQoSvj9e6rMAQAB2XS1ymcf9lcI2LRipahKFEPum1_tchh2fJ2Fzu0E2wpp \
ovbsO-g1s7JiS5oN9og3rQC8rMJ9HsgGpEhAJnRx2G7_NEcBitsKZVHugyKrMAECAg
</spanx></t>

</section>
</section>
<section anchor="sqisign-l3-test-vectors"><name>SQIsign-L3 Test Vectors</name>

<t><spanx style="verb">
[PLACEHOLDER FOR L3 TEST VECTORS]
</spanx></t>

</section>
<section anchor="sqisign-l5-test-vectors"><name>SQIsign-L5 Test Vectors</name>

<t><spanx style="verb">
[PLACEHOLDER FOR L5 TEST VECTORS]
</spanx></t>

</section>
</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>[RFC Editor: Please remove this section before publication]</t>

<t>This section records the status of known implementations at the time of writing.</t>

<section anchor="open-source-implementations"><name>Open Source Implementations</name>

<section anchor="reference-implementation"><name>Reference Implementation</name>

<t><list style="symbols">
  <t><strong>Organization</strong>: SQIsign team</t>
  <t><strong>Repository</strong>: https://github.com/SQISign/the-sqisign</t>
  <t><strong>Language</strong>: C</t>
  <t><strong>License</strong>: MIT</t>
  <t><strong>Status</strong>: Active development</t>
  <t><strong>COSE/JOSE Support</strong>: Not yet integrated</t>
</list></t>

</section>
<section anchor="rust-implementation"><name>Rust Implementation</name>

<t><list style="symbols">
  <t><strong>Organization</strong>: IETF - Community implementation</t>
  <t><strong>Repository</strong>: IETF</t>
  <t><strong>Language</strong>: Rust</t>
  <t><strong>License</strong>: IETF</t>
  <t><strong>COSE Support</strong>: Planned</t>
  <t><strong>Status</strong>: Development</t>
</list></t>

</section>
</section>
<section anchor="commercial-implementations"><name>Commercial Implementations</name>

<t>[RFC EDITOR: To be populated as vendors implement]</t>

</section>
<section anchor="interoperability-testing-1"><name>Interoperability Testing</name>

<t><list style="symbols">
  <t><strong>Test Suite Location</strong>: IETF</t>
  <t><strong>Participating Organizations</strong>: IETF</t>
</list></t>

</section>
</section>
<section anchor="design-rationale"><name>Design Rationale</name>

<section anchor="algorithm-identifier-selection"><name>Algorithm Identifier Selection</name>

<t>The requested algorithm identifiers (-61, -62, -63) are:</t>

<t><list style="symbols">
  <t>In the range designated for experimental/informational use</t>
  <t>Sequential for the three parameter sets</t>
  <t>Not conflicting with existing registrations</t>
  <t>Consistent with the approach used for other PQC algorithms</t>
</list></t>

</section>
<section anchor="key-type-design"><name>Key Type Design</name>

<t>The SQIsign key type is intentionally simple:</t>

<t><list style="symbols">
  <t>Only two parameters (pub, priv) following minimalist design</t>
  <t>Binary encoding (bstr) for efficiency</t>
  <t>No algorithm-specific encoding—raw bytes from SQIsign spec</t>
</list></t>

<t>This approach:
- Minimizes CBOR encoding overhead (critical for constrained devices)
- Simplifies implementation
- Provides future flexibility for parameter set evolution</t>

</section>
</section>
<section anchor="change-log"><name>Change Log</name>

<t>[RFC Editor Note:** Please remove this section before publication]</t>

<section anchor="draft-mott-cose-sqisign-00"><name>draft-mott-cose-sqisign-00</name>

<t><list style="symbols">
  <t>Initial version</t>
  <t>Algorithm registrations for SQIsign-L1, L3, L5</t>
  <t>COSE and JOSE integration specifications</t>
  <t>Security considerations for constrained devices</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

