<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 4.0.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mott-cose-sqisign-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="cose-sqisign">CBOR Object Signing and Encryption (COSE) and
JSON Object Signing and Encryption (JOSE)
Registrations for SQIsign</title>

    <author initials="A. R." surname="Mott" fullname="Antony R. Mott">
      <organization>RustyKey</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>antony@rustykey.io</email>
      </address>
    </author>

    <date year="2026" month="April" day="29"/>

    <area>SEC</area>
    <workgroup>COSE</workgroup>
    <keyword>post-quantum cryptography</keyword> <keyword>isogeny-based cryptography</keyword> <keyword>constrained devices</keyword> <keyword>IoT security</keyword>

    <abstract>


<?line 118?>

<t><strong>NOTE: This document describes a signature scheme based on an algorithm currently under evaluation in the NIST Post-Quantum Cryptography standardization process. Be aware that the underlying primitive may change as a result of that process.</strong></t>

<t>This document specifies the algorithm encodings and representations for the SQIsign digital signature scheme within the CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) frameworks.</t>

<t>SQIsign is an isogeny-based post-quantum signature scheme that provides exceptionally compact signature and public key sizes compared to lattice-based alternatives currently under NIST evaluation.</t>

<t>The standardization of SQIsign will be helpful to address current infrastructure bottlenecks, specifically the FIDO2 CTAP2 specification used by billions of in-service devices and browser installations. Some deployments of CTAP2-based authenticators enforce limits near 1024 bytes for external key communication, depending on authenticator implementation, transport (USB/NFC/BLE) and message fragmentation support. Some standardized post-quantum signature schemes with larger signature sizes may exceed the message size limits of constrained authenticators, transports or produce surprising and unwanted results further along the authentication ceremony. SQIsign-L1, L2 and L5 signatures are small enough to enable delivery over constrained networks like 802.15.4.</t>

<t>This document clarifies that SQIsign does not expose the auxiliary torsion-point information exploited in the SIDH/SIKE attacks. Consequently, the specific attack techniques of Castryck–Decru do not directly apply. However, the scheme remains subject to ongoing cryptanalysis of isogeny-based constructions. By establishing stable COSE and JOSE identifiers, this document ensures the interoperability required for the seamless integration of post-quantum security into high-density, bandwidth-constrained, and legacy-compatible hardware environments.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mott-cose-sqisign/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        COSE Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/antonymott/quantum-resistant-rustykey"/>.</t>
    </note>


  </front>

  <middle>


<?line 130?>

<section anchor="introduction"><name>Introduction</name>

<t>This document registers algorithm identifiers and key type parameters for SQIsign in COSE and JOSE.</t>

<section anchor="background-and-motivation"><name>Background and Motivation</name>

<t>Post-quantum cryptography readiness is critical for constrained devices. As of 2026, while FIDO2/WebAuthn supports various COSE algorithms, some hardware authenticators and platform authenticators (like TPMs) have strict memory/storage constraints, effectively limiting public keys to 1024 bytes or less, hindering the adoption of large-key post-quantum algorithms.</t>

<section anchor="pressing-need-for-smaller-pqc-signatures"><name>Pressing Need for Smaller PQC Signatures</name>

<t>FN-DSA (Falcon) and ML-DSA (Dilithium) have larger signatures that may not fit in constrained environments.</t>

<t>The fundamental differences between ML-DSA, FN-DSA, and SQIsign lie in their underlying hard mathematical problems, implementation complexity, and performance trade-offs.</t>

<t>FN-DSA (Falcon, NIST alternative) uses NTRU lattices to achieve very small signatures and fast verification, but requires complex floating-point math. Dilithium (NIST primary) is a balanced, high-efficiency lattice scheme using Module-LWE/SIS, easy to implement.</t>

<t>SQIsign <xref target="SQIsign-Spec"/> <xref target="SQIsign-Analysis"/> is a non-lattice, isogeny-based scheme that offers the smallest signature sizes but suffers from significantly slower signature generation where even vI may take seconds to minutes, or longer with WASM implementations for browsers of particular relevance to signatures required for WebAuthn PassKeys <xref target="WebAuthn-PQC-Signature-size-constraints"/>. SQIsign is an isogeny-based digital signature scheme participating in NIST's Round 2 Additional Digital Signature Schemes, not yet a NIST standard <xref target="NIST-Finalized-Standards"/>.</t>

<t>Speed comparison (approximate, implementation-dependent):</t>

<t><list style="symbols">
  <t><strong>Signing:</strong> SQIsign is 100x-1000x slower than ML-DSA</t>
  <t><strong>Verification:</strong> SQIsign is 2x-10x slower than ML-DSA</t>
  <t><strong>Key Generation:</strong> SQIsign is 50x-500x slower than ML-DSA</t>
</list></t>

<t><em>Note: Performance varies significantly based on parameter set and optimization level. WASM implementations may be substantially slower.</em></t>

<t>Table 1 compares representative parameter sets; note that these schemes are at different stages of standardization and evaluation.</t>

<texttable>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Public Key Size</ttcol>
      <ttcol align='left'>Signature Size</ttcol>
      <ttcol align='left'>PK + Sig &lt; 1024?</ttcol>
      <c>ML-DSA-44</c>
      <c>1,312 bytes</c>
      <c>2,420 bytes</c>
      <c>❌</c>
      <c>ML-DSA-65</c>
      <c>1,952 bytes</c>
      <c>3,293 bytes</c>
      <c>❌</c>
      <c>ML-DSA-87</c>
      <c>2,592 bytes</c>
      <c>4,595 bytes</c>
      <c>❌</c>
      <c>FN-DSA-512</c>
      <c>897 bytes</c>
      <c>666 bytes</c>
      <c>❌ (1,563 total)</c>
      <c>FN-DSA-1024</c>
      <c>1,793 bytes</c>
      <c>1,280 bytes</c>
      <c>❌</c>
      <c>SQIsign-L1</c>
      <c>65 bytes</c>
      <c>148 bytes</c>
      <c>✅ (213 total)</c>
      <c>SQIsign-L3</c>
      <c>97 bytes</c>
      <c>224 bytes</c>
      <c>✅ (321 total)</c>
      <c>SQIsign-L5</c>
      <c>129 bytes</c>
      <c>292 bytes</c>
      <c>✅ (421 total)</c>
</texttable>

</section>
<section anchor="estimated-constrained-device-footprint"><name>Estimated Constrained Device Footprint</name>

<t>The total addressable market for SQIsign in constrained devices is estimated at more than 6 billion units.</t>

<t><strong>Total Addressable Market:</strong> ~6.77 billion devices
- Legacy Hardware Security Keys: 120-150 million
- Constrained TPMs: ~1.1 billion<br />
- Browser Implementations: ~5 billion
- Critical Infrastructure: ~300 million
- Other IoT: ~250 million</t>

<section anchor="device-category-breakdown"><name>Device Category Breakdown</name>

<section anchor="legacy-hardware-security-keys-120-150-million"><name>Legacy Hardware Security Keys: ~120 - 150 million</name>
<t><list style="symbols">
  <t>Security keys in Service: ~120 - 150 million legacy keys in active circulation (Series 5 and older). Some firmware introduced PQC readiness. Some older keys cannot be updated to increase buffer sizes.</t>
</list></t>

</section>
<section anchor="constrained-tpms-and-platform-modules-11-billion"><name>Constrained TPMs and Platform Modules: ~1.1 billion</name>
<t>Trusted Platform Modules (TPMs) are integrated into PCs and servers, but their WebAuthn implementation often inherits protocol-level constraints. Estimated ~2.5 billion active chips worldwide. Constrained Subset: We estimate ~1.1 billion of these are in older Windows 10/11 or Linux machines where the OS "virtual authenticator" or TPM driver still enforces the 1024-byte message default to maintain backward compatibility with external CTAP1/2 tools.</t>

</section>
<section anchor="browser-and-software-implementations-5-billion"><name>Browser and Software Implementations: ~5 billion</name>
<t>This category refers to the "User-Agent" layer that mediates between the web and the hardware.
Global Browser Agents: There are over 5 billion active browser instances across mobile and desktop (Chrome, Safari, Edge, Firefox). Legacy Protocols: Even on modern hardware, browsers often use the FIDO2 CTAP2 specification which, unless explicitly negotiated for larger messages, maintains a 1024-byte default for external key communication.</t>

</section>
<section anchor="critical-infrastructure-300-million-includes-energy-electric-nuclear-oil-gas-water-wastewater-transportation-systems-communications-government-emergency-services-healthcare-and-financial-services"><name>Critical Infrastructure: ~300 Million includes Energy (electric, nuclear, oil, gas), Water &amp; Wastewater, Transportation Systems, Communications, Government, Emergency Services, Healthcare and Financial Services</name>
<t>Industrial/Government: Agencies like the U.S. Department of Defense rely on high-security FIPS-certified keys that are notoriously slow to upgrade. We estimate ~50 million "frozen" government keys. IoT Security: Of the ~21 billion connected IoT devices in 2026, only a fraction use WebAuthn. However, for those that do (smart locks, secure gateways), approximately 250 million are estimated to use older, non-upgradable secure elements limited to 1024-byte payloads. Recent government-level initiatives highlight the necessity to "...effectively deprecate the use of RSA, Diffie-Hellman (DH), and elliptic curve cryptography (ECDH and ECDSA) when mandated." <xref target="CNSA-2"/>, Page 4.</t>

</section>
</section>
</section>
<section anchor="pressing-need-limit-or-stop-harvest-now-decrypt-later-attacks"><name>Pressing need: Limit or Stop 'Harvest now; decrypt later' Attacks</name>
<t>Adversaries are collecting encrypted data today to decrypt when quantum computers become available. The transition to post-quantum cryptography (PQC) is critical for ensuring long-term security of digital communications against adversaries equipped with large-scale quantum computers. The National Institute of Standards and Technology (NIST) has been leading standardization efforts, having selected initial PQC algorithms and continuing to evaluate additional candidates.</t>

<t>CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/> is specifically designed for constrained node networks and IoT environments where bandwidth, storage, and computational resources are limited. The compact nature of SQIsign makes it an ideal candidate for COSE deployments.</t>

</section>
</section>
<section anchor="scope-and-status"><name>Scope and Status</name>

<t>This document is published on the <strong>Standards</strong> track rather than Informational Track for the following reasons:</t>

<t><list style="numbers" type="1">
  <t><strong>Algorithm Maturity</strong>: SQIsign is currently undergoing evaluation in NIST's on-ramp process</t>
  <t><strong>Continued Cryptanalysis</strong>: The algorithm has active ongoing review by the cryptographic research community, including the IRTF CFRG</t>
  <t><strong>High anticipated demand</strong>: This specification enables experimentation and early deployment to gather implementation experience</t>
</list></t>

<t><strong>This document does not represent Working Group consensus on algorithm innovation.</strong> The COSE and JOSE working groups focus on algorithm <em>integration</em> and <em>encoding</em>, not cryptographic algorithm design. The cryptographic properties of SQIsign are being evaluated through NIST's process and academic peer review.</t>

</section>
<section anchor="relationship-to-other-work"><name>Relationship to Other Work</name>

<t>This document follows the precedent established by <xref target="I-D.ietf-cose-falcon"/> and <xref target="I-D.ietf-cose-dilithium"/> for integrating NIST PQC candidate algorithms into COSE and JOSE. The structure and approach are intentionally aligned to provide consistency across post-quantum signature scheme integrations.</t>

</section>
<section anchor="constrained-device-applicability"><name>Constrained Device Applicability</name>
<t>SQIsign is particularly attractive for:</t>

<t><list style="symbols">
  <t><strong>IoT sensors</strong> with limited flash memory</t>
  <t><strong>Firmware updates</strong> over low-bandwidth networks (LoRaWAN, NB-IoT)</t>
  <t><strong>Embedded certificates</strong> in constrained devices</t>
  <t><strong>Blockchain and DLT</strong> where transaction size affects fees</t>
  <t><strong>Satellite communications</strong> with bandwidth constraints</t>
</list></t>

</section>
</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>This document uses the following terms:</t>

<t><list style="symbols">
  <t><strong>PQC</strong>: Post-Quantum Cryptography</t>
  <t><strong>COSE</strong>: CBOR Object Signing and Encryption</t>
  <t><strong>JOSE</strong>: JSON Object Signing and Encryption</t>
  <t><strong>JWS</strong>: JSON Web Signature</t>
  <t><strong>JWK</strong>: JSON Web Key</t>
  <t><strong>CBOR</strong>: Concise Binary Object Representation <xref target="RFC7049"/></t>
  <t><strong>ECDH</strong>: Elliptic Curve Diffie-Hellman</t>
  <t><strong>IANA</strong>: Internet Assigned Numbers Authority</t>
</list></t>

</section>
<section anchor="resistance-to-torsion-point-attack"><name>Resistance to "Torsion Point" attack</name>

<section anchor="sike-vulnerability-the-torsion-point-attack-of-2022"><name>SIKE Vulnerability (The "Torsion Point" Attack) of 2022</name>

<t>SIKE (Supersingular Isogeny Key Encapsulation) was a key exchange, more specifically, a Key Encapsulation Mechanism (KEM). In the SIKE protocol, users had to share more than just the target elliptic curve. To make the math work for key exchange, they shared the images of specific points (called torsion points) under the secret isogeny.</t>

<t><list style="symbols">
  <t>The Info: If the secret isogeny is 𝜙, SIKE gave away 𝜙(𝑃) and 𝜙(𝑄) for specific basis points 𝑃 and 𝑄.</t>
  <t>The Break: In 2022, Castryck and Decru showed that this auxiliary information allowed an attacker to construct a higher-dimensional abelian variety linking the public data. In this setting, the secret isogeny can be recovered efficiently using techniques based on Kani’s results on isogenies between products of elliptic curves.</t>
  <t>The Oversight: For years, cryptanalysts thought this extra info was harmless. Related techniques existed in the algebraic geometry literature but had not previously been applied in this cryptographic context.</t>
</list></t>

</section>
<section anchor="why-sqisign-appears-unaffected-by-the-sike-vulnerability"><name>Why SQISign appears unaffected by the SIKE Vulnerability</name>

<t>SQIsign is a signature scheme in which the prover demonstrates knowledge of an isogeny through a zero-knowledge protocol. Unlike SIDH/SIKE, it does not publish images of torsion basis points under secret isogenies, specifically:</t>

<t><list style="symbols">
  <t>SIKE: key exchange with auxiliary structure leakage</t>
  <t>SQIsign: proof/verification of isogeny knowledge without publishing auxiliary isogeny action data</t>
</list></t>

<t>The Castryck–Decru attack relies critically on this auxiliary torsion-point information to construct additional structure (e.g., via abelian surfaces) that enables efficient recovery of the secret isogeny.
Because SQIsign does not provide such auxiliary data, these techniques do not directly apply. Attacks would instead need to solve instances of the isogeny path problem or related problems in the endomorphism ring, for which no comparable shortcut is currently known.</t>

</section>
</section>
<section anchor="sqisign-algorithm-overview"><name>SQIsign Algorithm Overview</name>

<section anchor="cryptographic-foundation"><name>Cryptographic Foundation</name>

<t>SQIsign is based on the hardness of finding isogenies between supersingular elliptic curves over finite fields. The security assumption relies primarily on the difficulty of the <strong>Isogeny Path Problem</strong></t>

<t>Unlike lattice-based schemes, isogeny-based cryptography offers:</t>

<t><list style="symbols">
  <t><strong>Smaller key and signature sizes</strong></t>
  <t><strong>Algebraic structure</strong> based on elliptic curve isogenies</t>
  <t><strong>Different security assumptions</strong> (diversification from lattice-based schemes)</t>
</list></t>

</section>
<section anchor="security-levels"><name>Security Levels</name>

<t>SQIsign is defined with three parameter sets corresponding to NIST security levels:</t>

<texttable>
      <ttcol align='left'>Parameter Set</ttcol>
      <ttcol align='left'>NIST Level</ttcol>
      <ttcol align='left'>Public Key</ttcol>
      <ttcol align='left'>Signature</ttcol>
      <ttcol align='left'>Classical Sec</ttcol>
      <c>SQIsign-L1</c>
      <c>I</c>
      <c>65 bytes</c>
      <c>148 bytes</c>
      <c>~128 bits</c>
      <c>SQIsign-L3</c>
      <c>III</c>
      <c>97 bytes</c>
      <c>224 bytes</c>
      <c>~192 bits</c>
      <c>SQIsign-L5</c>
      <c>V</c>
      <c>129 bytes</c>
      <c>292 bytes</c>
      <c>~256 bits</c>
</texttable>

</section>
<section anchor="performance-characteristics"><name>Performance Characteristics</name>

<t><list style="symbols">
  <t><strong>Signing</strong>: Computationally intensive (slower than lattice schemes)</t>
  <t><strong>Verification</strong>: Moderate computational cost</t>
  <t><strong>Key Generation</strong>: Intensive computation required</t>
  <t><strong>Size</strong>: Exceptional efficiency: substantially smaller than many lattice-based alternatives at comparable security levels</t>
</list></t>

<t><strong>Recommended Use Cases:</strong>
- Sign-once, verify-many scenarios (firmware, certificates)
- Bandwidth-constrained environments
- Storage-limited devices
- Applications where signature/key size dominates performance considerations</t>

</section>
</section>
<section anchor="cose-integration"><name>COSE Integration</name>

<t>This section defines the identifiers for SQIsign in COSE <xref target="RFC8152"/>.</t>

<section anchor="sqisign-algorithms"><name>SQIsign Algorithms</name>

<t>The algorithms defined in this document are:</t>

<t><list style="symbols">
  <t>SQIsign-L1: SQIsign NIST Level I (suggested value -61)</t>
  <t>SQIsign-L3: SQIsign NIST Level III (suggested value -62)</t>
  <t>SQIsign-L5: SQIsign NIST Level V (suggested value -63)</t>
</list></t>

<t><strong>Note:</strong> The algorithm identifier values (-61, -62, -63) are requested from IANA upon working group adoption. Early implementations may use temporary values from the Private Use range (-65000 to -65535) for experimentation.</t>

</section>
<section anchor="sqisign-key-types"><name>SQIsign Key Types</name>

<t>A new key type is defined for SQIsign with the name "SQIsign".</t>

</section>
<section anchor="sqisign-key-parameters"><name>SQIsign Key Parameters</name>

<t>SQIsign keys use the following COSE Key common parameters:</t>

<texttable>
      <ttcol align='left'>Key Parameter</ttcol>
      <ttcol align='left'>COSE Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>kty</c>
      <c>1</c>
      <c>int</c>
      <c>Key type: IETF (SQIsign)</c>
      <c>kid</c>
      <c>2</c>
      <c>bstr</c>
      <c>Key ID (optional)</c>
      <c>alg</c>
      <c>3</c>
      <c>int</c>
      <c>Algorithm identifier (-61, -62, or -63)</c>
      <c>key_ops</c>
      <c>4</c>
      <c>array</c>
      <c>Key operations (<spanx style="verb">sign</spanx>, <spanx style="verb">verify</spanx>)</c>
</texttable>

</section>
<section anchor="sqisign-specific-key-parameters"><name>SQIsign-Specific Key Parameters</name>

<texttable>
      <ttcol align='left'>Key Parameter</ttcol>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>pub</c>
      <c>-1</c>
      <c>bstr</c>
      <c>SQIsign public key</c>
      <c>priv</c>
      <c>-2</c>
      <c>bstr</c>
      <c>SQIsign private key (sensitive)</c>
</texttable>

</section>
<section anchor="cose-key-format-examples"><name>COSE Key Format Examples</name>

<t>NOTE: SQIsign keys are structurally distinct and not representable as existing EC key types due to non-classical representation.</t>

<section anchor="public-key-cosekey"><name>Public Key (COSE_Key)</name>

<t><spanx style="verb">cbor
{
  1: IETF,              / kty: SQIsign /
  3: -61,              / alg: SQIsign-L1 /
  -1: h'[PUBLIC_KEY]'  / pub: SQIsign public key bytes /
}
</spanx></t>

</section>
<section anchor="private-key-cosekey"><name>Private Key (COSE_Key)</name>

<t><spanx style="verb">cbor
{
  1: IETF,               / kty: SQIsign /
  3: -61,               / alg: SQIsign-L1 /
  -1: h'[PUBLIC_KEY]',  / pub: SQIsign public key bytes /
  -2: h'[PRIVATE_KEY]'  / priv: SQIsign private key bytes /
}
</spanx></t>

</section>
</section>
<section anchor="cose-signature-format"><name>COSE Signature Format</name>

<t>SQIsign signatures in COSE follow the standard COSE_Sign1 structure <xref target="RFC9052"/>:</t>

<t><spanx style="verb">
COSE_Sign1 = [
    protected: bstr .cbor header_map,
    unprotected: header_map,
    payload: bstr / nil,
    signature: bstr
]
</spanx></t>

<t>The <spanx style="verb">signature</spanx> field contains the raw SQIsign signature bytes.</t>

<section anchor="protected-headers"><name>Protected Headers</name>

<t>The protected header <bcp14>MUST</bcp14> include:</t>

<t><spanx style="verb">cbor
{
  1: -61  / alg: SQIsign-L1, -62 for L3, -63 for L5 /
}
</spanx></t>

</section>
<section anchor="example-cosesign1-structure"><name>Example COSE_Sign1 Structure</name>

<t><spanx style="verb">cbor
18(                                  / COSE_Sign1 tag /
  [
    h'A10139003C',                   / protected: {"alg": -61} /
    {},                              / unprotected /
    h'546869732069732074686520636F6E74656E742E', / payload /
    h'[SQISIGN_SIGNATURE_BYTES]'     / signature /
  ]
)
</spanx></t>

</section>
</section>
</section>
<section anchor="jose-integration"><name>JOSE Integration</name>

<section anchor="json-web-signature-jws-algorithm-registration"><name>JSON Web Signature (JWS) Algorithm Registration</name>

<t>The following algorithm identifiers are registered for use in the JWS "alg" header parameter for JSON Web Signatures <xref target="RFC7515"/>:</t>

<texttable>
      <ttcol align='left'>Algorithm Name</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Implementation Requirements</ttcol>
      <c>SQIsign-L1</c>
      <c>SQIsign NIST Level I</c>
      <c>Optional</c>
      <c>SQIsign-L3</c>
      <c>SQIsign NIST Level III</c>
      <c>Optional</c>
      <c>SQIsign-L5</c>
      <c>SQIsign NIST Level V</c>
      <c>Optional</c>
</texttable>

</section>
<section anchor="json-web-key-jwk-representation"><name>JSON Web Key (JWK) Representation</name>

<t>SQIsign keys are represented in JWK <xref target="RFC7517"/> format as follows:</t>

<section anchor="public-key-parameters"><name>Public Key Parameters</name>

<texttable>
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>kty</c>
      <c>string</c>
      <c>Key type: "SQIsign"</c>
      <c>alg</c>
      <c>string</c>
      <c>Algorithm: "SQIsign-L1", "SQIsign-L3", or "SQIsign-L5"</c>
      <c>pub</c>
      <c>string</c>
      <c>Base64url-encoded public key</c>
      <c>kid</c>
      <c>string</c>
      <c>Key ID (optional)</c>
      <c>use</c>
      <c>string</c>
      <c>Public key use: "sig" (optional)</c>
      <c>key_ops</c>
      <c>array</c>
      <c>Key operations: [verify] (optional)</c>
</texttable>

</section>
<section anchor="private-key-parameters"><name>Private Key Parameters</name>

<t>Private keys include all public key parameters plus:</t>

<texttable>
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>priv</c>
      <c>string</c>
      <c>Base64url-encoded private key</c>
</texttable>

</section>
</section>
<section anchor="jwk-examples"><name>JWK Examples</name>

<section anchor="public-key-jwk-example"><name>Public Key (JWK) Example</name>

<t><spanx style="verb">json
{
  "kty": "SQIsign",
  "alg": "SQIsign-L1",
  "pub": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_\
    5xZuqgMwkaeJhM94YHi_-2UsQllbnmm-W4XFSLm2hUwiMylrAh0",
  "kid": "2027-01-device-key",
  "use": "sig",
  "key_ops": ["verify"]
}
</spanx></t>

</section>
<section anchor="private-key-jwk-example"><name>Private Key (JWK) Example</name>

<t><spanx style="verb">json
{
  "kty": "SQIsign",
  "alg": "SQIsign-L1",
  "pub": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_\
    5xZuqgMwkaeJhM94YHi_-2UsQllbnmm-W4XFSLm2hUwiMylrAh0",
  "priv": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_5xZuqgMwkaeJhM94YHi_\
    -2UsQllbnmm-W4XFSLm2hUwiMylrAh1VwP9vNkBZH0Bjj2wc-\
    p7sUgQAAAAAAAAAAAAAAAAAAN68tviJbcCpQ84fh-4IJB4-\
    ____________________P38m3fKOhfhMspQU9GmA4CD5___\
    _______________________________________________\
    ___________wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\
    AAAAAAA5cP9aha40v-8mFd_bdAgpR93Ug2iPhu4_NxG97C7\
    8wBvVMGOrQTCli7NxrR2KlPZR1AC5VddGf4p-ZjCzrWfAJv\
    xhEh4uOKXq1MmuS9TwZGuz1YIYMIguu1wqjdmfaQAfOmK2g\
    WWO3vcld5s7GR2AcrTv65ocK_pVUWY8eJDcQA",
  "kid": "2027-01-device-key",
  "use": "sig",
  "key_ops": ["sign"]
}
</spanx></t>

</section>
</section>
<section anchor="jws-compact-serialization"><name>JWS Compact Serialization</name>

<t>A JWS using SQIsign follows the standard compact serialization:</t>

<t><spanx style="verb">
BASE64URL(UTF8(JWS Protected Header)) || '.' ||
BASE64URL(JWS Payload) || '.' ||
BASE64URL(JWS Signature)
</spanx></t>

<section anchor="example-jws-protected-header"><name>Example JWS Protected Header</name>

<t><spanx style="verb">json
{
  "alg": "SQIsign-L1",
  "typ": "JWT"
}
</spanx></t>

<t>Base64url-encoded: <spanx style="verb">eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0</spanx></t>

</section>
<section anchor="complete-jws-example"><name>Complete JWS Example</name>

<t><spanx style="verb">
eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0
.
[BASE64URL_PAYLOAD]
.
[BASE64URL_SQISIGN_SIGNATURE]
</spanx></t>

</section>
</section>
</section>
<section anchor="implementation-considerations"><name>Implementation Considerations</name>

<section anchor="signature-and-key-generation"><name>Signature and Key Generation</name>

<t>Implementations <bcp14>MUST</bcp14> follow the SQIsign specification <xref target="SQIsign-Spec"/> for:</t>

<t><list style="symbols">
  <t>Key pair generation</t>
  <t>Signature generation</t>
  <t>Signature verification</t>
</list></t>

</section>
<section anchor="randomness-requirements"><name>Randomness Requirements</name>

<t>SQIsign signature generation requires high-quality randomness. Implementations <bcp14>MUST</bcp14> use a cryptographically secure random number generator (CSRNG) compliant with <xref target="RFC4086"/> or equivalent.</t>

</section>
<section anchor="side-channel-protections"><name>Side-Channel Protections</name>

<t>Implementations <bcp14>SHOULD</bcp14> implement protections against:</t>

<t><list style="symbols">
  <t>Timing attacks</t>
  <t>Power analysis</t>
  <t>Fault injection attacks</t>
</list></t>

<t>Particularly for constrained devices deployed in physically accessible environments.</t>

</section>
<section anchor="performance-trade-offs"><name>Performance Trade-offs</name>

<t>Implementers should be aware:</t>

<t><list style="symbols">
  <t><strong>Signing is computationally expensive</strong>: Consider pre-signing or batch operations</t>
  <t><strong>Verification is moderate</strong>: Suitable for resource-constrained verifiers</t>
  <t><strong>Size is exceptional</strong>: Minimizes bandwidth and storage</t>
</list></t>

</section>
<section anchor="interoperability-testing"><name>Interoperability Testing</name>

<t>Early implementations <bcp14>SHOULD</bcp14> participate in interoperability testing to ensure:</t>

<t><list style="symbols">
  <t>Consistent signature generation and verification</t>
  <t>Proper encoding in COSE and JOSE formats</t>
  <t>Cross-platform compatibility</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="algorithm-security"><name>Algorithm Security</name>

<t>The security of SQIsign relies primarily on the hardness of finding isogenies between supersingular elliptic curves.</t>

<t>These assumptions are <strong>different from lattice-based schemes</strong>, providing cryptographic diversity in the post-quantum landscape.</t>

</section>
<section anchor="quantum-security"><name>Quantum Security</name>

<t>SQIsign is designed to resist attacks by large-scale quantum computers. The three parameter sets provide security equivalent to AES-128, AES-192, and AES-256 against both classical and quantum adversaries.</t>

</section>
<section anchor="forward-looking-quantum-risk-isogeny-schemes-vs-lattice-schemes"><name>Forward-Looking Quantum Risk: isogeny schemes vs lattice schemes</name>

<t>Isogeny schemes are not yet trusted in the same way as lattice schemes, this section is here to avoid even the appearance of tone drift toward endorsement of isogeny schemes.</t>

<t>No publicly known attacks applicable to the standardized parameter sets that recover full private keys under stated assumptions, but the field is evolving. SQISign's security is based on hardness assumptions different from factoring/discrete log problems, leading to the expectation it will resist known quantum attacks using Shor's algorithm <xref target="Shor-Algorithm"/>. Ongoing research is exploring new types of quantum algorithms that could weaken certain underlying assumptions in isogeny-based cryptography.</t>

<t>Organizations considering deployment should plan for long-term flexibility, including the ability to update or replace cryptographic algorithms as new information becomes available.</t>

<section anchor="quantum-algorithms-for-isogeny-path-problems"><name>Quantum algorithms for isogeny path problems</name>

<section anchor="tanis-algorithm"><name>Tani's algorithm</name>

<t>Tani's algorithm <xref target="Tani-Algorithm"/> achieves (O(N^{1/3})\ query complexity for claw-finding / quantum walk problems instead of (O(N^{1/2})). However, as analyzed by Jaques and Schanck <xref target="Jaques-Schanck-Cryptanalysis"/>, practical implementation faces significant barriers:</t>

<t><list style="symbols">
  <t><strong>Quantum RAM requirements:</strong> Exponentially large qRAM with sub-nanosecond access</t>
  <t><strong>Parallelization limits:</strong> Circuit depth constraints reduce theoretical speedup</t>
  <t><strong>Error correction overhead:</strong> Physical qubit requirements may exceed 10^9 qubits</t>
</list></t>

<t>These constraints suggest that even with fault-tolerant quantum computers, Tani-style attacks remain impractical for security parameters used in SQIsign-L3 and SQIsign-L5.</t>

</section>
</section>
</section>
<section anchor="current-cryptanalysis-status"><name>Current Cryptanalysis Status</name>

<t>As of this writing, SQIsign is undergoing active cryptanalytic review:</t>

<t><list style="symbols">
  <t><strong>NIST Round 2 evaluation</strong>: <xref target="NIST-Finalized-Standards"/></t>
  <t><strong>Academic research</strong>: Ongoing analysis of isogeny-based cryptography</t>
  <t><strong>Known attacks</strong>: No attacks are currently known that recover private keys for the standardized parameter sets within their claimed security levels. However, the scheme and its underlying assumptions remain under active study.</t>
</list></t>

<t><strong>Implementers are advised</strong>:
- Monitor NIST announcements and updates
- Follow academic literature on isogeny cryptanalysis
- Be prepared to deprecate or update as cryptanalysis evolves</t>

</section>
<section anchor="implementation-security"><name>Implementation Security</name>

<section anchor="random-number-generation"><name>Random Number Generation</name>

<t>Poor randomness can completely compromise SQIsign security. Implementations <bcp14>MUST</bcp14> use robust CSRNGs, especially on constrained devices with limited entropy sources.</t>

</section>
<section anchor="side-channel-resistance"><name>Side-Channel Resistance</name>

<t>Constrained devices may be physically accessible to attackers. Implementations <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Use constant-time algorithms where possible</t>
  <t>Implement countermeasures against DPA/SPA</t>
  <t>Consider fault attack mitigations</t>
</list></t>

</section>
<section anchor="key-management"><name>Key Management</name>

<t><list style="symbols">
  <t>Private keys <bcp14>MUST</bcp14> be protected with appropriate access controls</t>
  <t>Consider hardware security modules (HSMs) or secure elements for key storage</t>
  <t>Implement key rotation policies appropriate to the deployment</t>
</list></t>

</section>
</section>
<section anchor="cryptographic-agility"><name>Cryptographic Agility</name>

<t>Organizations deploying SQIsign <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Maintain hybrid deployments with classical algorithms during transition</t>
  <t>Plan for algorithm migration if cryptanalysis reveals weaknesses</t>
  <t>Monitor NIST and IRTF guidance on PQC deployment</t>
</list></t>

</section>
<section anchor="constrained-device-specific-risks"><name>Constrained Device Specific Risks</name>

<t>IoT devices face unique challenges:</t>

<t><list style="symbols">
  <t><strong>Physical access</strong>: Devices may be deployed in hostile environments</t>
  <t><strong>Limited update capability</strong>: Firmware updates may be infrequent or impossible</t>
  <t><strong>Long deployment lifetimes</strong>: Devices may operate for 10+ years</t>
</list></t>

<t>Design systems with:
- Defense in depth (multiple security layers)
- Remote update capability when possible
- Graceful degradation if algorithm is compromised</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<t>IANA is requested to add the following entries to the COSE and JOSE registries. The following completed registration actions are provided as described in <xref target="RFC9053"/> and <xref target="RFC9054"/>.</t>

<section anchor="new-cose-algorithms"><name>New COSE Algorithms</name>

<t>IANA is requested to register the following entries in the "COSE Algorithms" registry:</t>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Capabilities</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <ttcol align='left'>Rec'd</ttcol>
      <c>SQIsign-L1</c>
      <c>-61</c>
      <c>SQIsign NIST L I</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L3</c>
      <c>-62</c>
      <c>SQIsign NIST L III</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L5</c>
      <c>-63</c>
      <c>SQIsign NIST L V</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
</texttable>

</section>
<section anchor="new-cose-key-types"><name>New COSE Key Types</name>

<t>IANA is requested to register the following entry in the "COSE Key Types" registry:</t>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Capabilities</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>SQIsign pub key</c>
      <c>sign, verify</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-cose-key-type-parameters"><name>New COSE Key Type Parameters</name>

<t>IANA is requested to register the following entries in the "COSE Key Type Parameters" registry:</t>

<texttable>
      <ttcol align='left'>Key Type</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SQIsign</c>
      <c>pub</c>
      <c>-1</c>
      <c>bstr</c>
      <c>Public key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>SQIsign</c>
      <c>priv</c>
      <c>-2</c>
      <c>bstr</c>
      <c>Private key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-jws-algorithms"><name>New JWS Algorithms</name>

<t>IANA is requested to register the following entries in the "JSON Web Signature and Encryption Algorithms" registry:</t>

<texttable>
      <ttcol align='left'>Algorithm Name</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Impl Req</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <c>SQIsign-L1</c>
      <c>SQIsign NIST L I</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L3</c>
      <c>SQIsign NIST L III</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L5</c>
      <c>SQIsign NIST L V</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
</texttable>

</section>
<section anchor="new-json-web-key-types"><name>New JSON Web Key Types</name>

<t>IANA is requested to register the following entry in the "JSON Web Key Types" registry:</t>

<texttable>
      <ttcol align='left'>"kty" Param Value</ttcol>
      <ttcol align='left'>Key Type Desc</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SQIsign</c>
      <c>SQIsign public key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-json-web-key-parameters"><name>New JSON Web Key Parameters</name>

<t>IANA is requested to register the following entries in the "JSON Web Key Parameters" registry:</t>

<texttable>
      <ttcol align='left'>Param Name</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Used with "kty" Val</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>pub</c>
      <c>Public key</c>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>priv</c>
      <c>Private key</c>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank:</t>

<t><list style="symbols">
  <t>Luca DeFeo for reviewing draft-00 and providing valuable feedback. Any remaining errors are solely the responsibility of the authors.</t>
  <t>The SQIsign design team for groundbreaking work on isogeny-based signatures</t>
  <t>The NIST PQC team for managing the standardization process</t>
  <t>The COSE and JOSE working groups for guidance on integration</t>
  <t>The IRTF Crypto Forum Research Group for ongoing cryptanalytic review</t>
  <t>Early implementers who provide valuable feedback</t>
</list></t>

<t>This work builds upon the template established by <xref target="I-D.ietf-cose-falcon"/> and similar PQC integration efforts.</t>

</section>
<section anchor="references"><name>References</name>

<section anchor="normative-references"><name>Normative References</name>

<t><em>Populated automatically from metadata</em></t>

</section>
<section anchor="informative-references"><name>Informative References</name>

<t><em>Populated automatically from metadata</em></t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC7515">
  <front>
    <title>JSON Web Signature (JWS)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7515"/>
  <seriesInfo name="DOI" value="10.17487/RFC7515"/>
</reference>
<reference anchor="RFC7517">
  <front>
    <title>JSON Web Key (JWK)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7517"/>
  <seriesInfo name="DOI" value="10.17487/RFC7517"/>
</reference>
<reference anchor="RFC8152">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8152"/>
  <seriesInfo name="DOI" value="10.17487/RFC8152"/>
</reference>
<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>
<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>
<reference anchor="RFC9054">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9054"/>
  <seriesInfo name="DOI" value="10.17487/RFC9054"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4086">
  <front>
    <title>Randomness Requirements for Security</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="J. Schiller" initials="J." surname="Schiller"/>
    <author fullname="S. Crocker" initials="S." surname="Crocker"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
      <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="106"/>
  <seriesInfo name="RFC" value="4086"/>
  <seriesInfo name="DOI" value="10.17487/RFC4086"/>
</reference>
<reference anchor="RFC7049">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7049"/>
  <seriesInfo name="DOI" value="10.17487/RFC7049"/>
</reference>

<reference anchor="I-D.ietf-cose-falcon">
   <front>
      <title>FN-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>mesur.io</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Tradeverifyd</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of the Bundeswehr Munich</organization>
      </author>
      <date day="15" month="March" year="2026"/>
      <abstract>
	 <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for FFT
   (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature
   Algorithm (FN-DSA), a Post-Quantum Cryptography (PQC) digital
   signature scheme defined in US NIST FIPS 206 (expected to be
   published in late 2026 early 2027).

   It does not define new cryptographic primitives; rather, it specifies
   how existing FN-DSA mechanisms are serialized for use in JOSE and
   COSE.  This document registers signature algorithms for JOSE and
   COSE, specifically FN-DSA-512 and FN-DSA-1024.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-falcon-04"/>
   
</reference>

<reference anchor="I-D.ietf-cose-dilithium">
   <front>
      <title>ML-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>Tradeverifyd</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Tradeverifyd</organization>
      </author>
      <date day="15" month="November" year="2025"/>
      <abstract>
	 <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
   
</reference>

<reference anchor="SQIsign-Spec" target="https://sqisign.org/spec/sqisign-20250205.pdf">
  <front>
    <title>SQIsign: Compact Post-Quantum Signatures from Quaternions and Isogenies (Round 2)</title>
    <author initials="" surname="SQIsign team">
      <organization></organization>
    </author>
    <date year="2025" month="February"/>
  </front>
</reference>
<reference anchor="NIST-Finalized-Standards" target="https://www.nist.gov/news-events/news/2024/08/
nist-releases-first-3-finalized-post-quantum-encryption-standards
">
  <front>
    <title>"NIST Releases First 3 Finalized
Post-Quantum Encryption Standards"</title>
    <author >
      <organization>NIST</organization>
    </author>
    <date year="2024" month="August"/>
  </front>
</reference>
<reference anchor="SQIsign-Analysis" target="https://eprint.iacr.org/2020/1240">
  <front>
    <title>"SQIsign: Compact Post-Quantum Signatures
from Quaternions and Isogenies"</title>
    <author >
      <organization>IACR ePrint Archive</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="CNSA-2" target="https://media.defense.gov/2025/May/30/
2003728741/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS.PDF
">
  <front>
    <title>Commercial National Security Algorithm Suite 2.0</title>
    <author >
      <organization>National Security Agency</organization>
    </author>
    <date year="2025" month="May"/>
  </front>
</reference>
<reference anchor="WebAuthn-PQC-Signature-size-constraints" target="https://www.npmjs.com/package/quantum-resistant-rustykey">
  <front>
    <title>WebAuthn PQC Signature size constraints</title>
    <author >
      <organization>University of Quantum Science</organization>
    </author>
    <date year="2026" month="April"/>
  </front>
</reference>
<reference anchor="Shor-Algorithm" target="https://arxiv.org/abs/quant-ph/9508027">
  <front>
    <title>"Polynomial-Time Algorithms for Prime Factorization and
Discrete Logarithms on a Quantum Computer"</title>
    <author initials="P. W." surname="Shor">
      <organization></organization>
    </author>
    <date year="1996" month="January"/>
  </front>
</reference>
<reference anchor="Tani-Algorithm" target="https://arxiv.org/abs/0708.2584">
  <front>
    <title>Claw Finding Algorithms Using Quantum Walk</title>
    <author initials="S." surname="Tani">
      <organization></organization>
    </author>
    <date year="2007" month="August"/>
  </front>
</reference>
<reference anchor="Jaques-Schanck-Cryptanalysis" target="https://eprint.iacr.org/archive/2019/103/20190619:191423">
  <front>
    <title>"Quantum cryptanalysis in the RAM model:
Claw-finding attacks on SIKE"</title>
    <author initials="S." surname="Jaques">
      <organization></organization>
    </author>
    <author initials="J. M." surname="Schanck">
      <organization></organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>


    </references>

</references>


<?line 739?>

<section anchor="test-vectors"><name>Test Vectors</name>

<section anchor="sqisign-l1-test-vectors"><name>SQIsign-L1 Test Vectors</name>

<section anchor="example-1-simple-message-signing"><name>Example 1: Simple Message Signing</name>

<t>The following test vector exhibits a SQIsign Level I signature over a short message.</t>

<t>Message (hex): <spanx style="verb">d81c4d8d734fcbfbeade3d3f8a039faa2a2c9957e835ad55b2 \
2e75bf57bb556ac8</spanx>
Message (ASCII): <spanx style="verb">MsO=?*,W5U.uWUj</spanx></t>

<t>Public Key (hex): <spanx style="verb">07CCD21425136F6E865E497D2D4D208F0054AD81372066E \
817480787AAF7B2029550C89E892D618CE3230F23510BFBE68FCCDDAEA51DB1436 \
B462ADFAF008A010B</spanx>
Public Key (Base64url): <spanx style="verb">B8zSFCUTb26GXkl9LU0gjwBUrYE3IGboF0gHh6r3s \
gKVUMieiS1hjOMjDyNRC_vmj8zdrqUdsUNrRirfrwCKAQs</spanx></t>

<t>Signature (hex): <spanx style="verb">84228651f271b0f39f2f19f2e8718f31ed3365ac9e5cb303 \
afe663d0cfc11f0455d891b0ca6c7e653f9ba2667730bb77befe1b1a3182840428 \
4af8fd7baacc010001d974b5ca671ff65708d8b462a5a84a1443ee9b5fed721876 \
7c9d85ceed04db0a69a2f6ec3be835b3b2624b9a0df68837ad00bcacc27d1ec806 \
a44840267471d86eff3447018adb0a6551ee8322ab30010202</spanx>
Signature (Base64url): <spanx style="verb">hCKGUfJxsPOfLxny6HGPMe0zZayeXLMDr-Zj0M_BHw \
RV2JGwymx-ZT-bomZ3MLt3vv4bGjGChAQoSvj9e6rMAQAB2XS1ymcf9lcI2LRipahK \
FEPum1_tchh2fJ2Fzu0E2wppovbsO-g1s7JiS5oN9og3rQC8rMJ9HsgGpEhAJnRx2G \
7_NEcBitsKZVHugyKrMAECAg</spanx></t>

</section>
<section anchor="cosesign1-complete-example"><name>COSE_Sign1 Complete Example</name>

<t><spanx style="verb">cbor
18(
  [
    h'a10139003c', / protected: {"alg": -61} /
    {},           / unprotected /
    h'd81c4d8d734fcbfbeade3d3f8a039faa2a2c9957e835ad55b22e75bf57bb \
    556ac8', / payload /
    h'84228651f271b0f39f2f19f2e8718f31ed3365ac9e5cb303afe663d0cfc1 \
    1f0455d891b0ca6c7e653f9ba2667730bb77befe1b1a31828404284af8fd7b \
    aacc010001d974b5ca671ff65708d8b462a5a84a1443ee9b5fed7218767c9d \
    85ceed04db0a69a2f6ec3be835b3b2624b9a0df68837ad00bcacc27d1ec806 \
    a44840267471d86eff3447018adb0a6551ee8322ab30010202'
  ]
)
</spanx></t>

</section>
<section anchor="jws-complete-example"><name>JWS Complete Example</name>

<t><spanx style="verb">
eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0
.
2BxNjXNPy_vq3j0_igOfqiosmVfoNa1Vsi51v1e7VWrI
.
hCKGUfJxsPOfLxny6HGPMe0zZayeXLMDr-Zj0M_BHwRV2JGwymx-ZT-bomZ3MLt3vv \
4bGjGChAQoSvj9e6rMAQAB2XS1ymcf9lcI2LRipahKFEPum1_tchh2fJ2Fzu0E2wpp \
ovbsO-g1s7JiS5oN9og3rQC8rMJ9HsgGpEhAJnRx2G7_NEcBitsKZVHugyKrMAECAg
</spanx></t>

</section>
</section>
<section anchor="sqisign-l3-test-vectors"><name>SQIsign-L3 Test Vectors</name>

<t><spanx style="verb">
[PLACEHOLDER FOR L3 TEST VECTORS]
</spanx></t>

</section>
<section anchor="sqisign-l5-test-vectors"><name>SQIsign-L5 Test Vectors</name>

<t><spanx style="verb">
[PLACEHOLDER FOR L5 TEST VECTORS]
</spanx></t>

</section>
</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>[RFC Editor: Please remove this section before publication]</t>

<t>This section records the status of known implementations at the time of writing.</t>

<section anchor="open-source-implementations"><name>Open Source Implementations</name>

<section anchor="reference-implementation"><name>Reference Implementation</name>

<t><list style="symbols">
  <t><strong>Organization</strong>: SQIsign team</t>
  <t><strong>Repository</strong>: https://github.com/SQISign/the-sqisign</t>
  <t><strong>Language</strong>: C</t>
  <t><strong>License</strong>: MIT</t>
  <t><strong>Status</strong>: Active development</t>
  <t><strong>COSE/JOSE Support</strong>: Not yet integrated</t>
</list></t>

</section>
<section anchor="rust-implementation"><name>Rust Implementation</name>

<t><list style="symbols">
  <t><strong>Organization</strong>: IETF - Community implementation</t>
  <t><strong>Repository</strong>: IETF</t>
  <t><strong>Language</strong>: Rust</t>
  <t><strong>License</strong>: IETF</t>
  <t><strong>COSE Support</strong>: Planned</t>
  <t><strong>Status</strong>: Development</t>
</list></t>

</section>
</section>
<section anchor="commercial-implementations"><name>Commercial Implementations</name>

<t>[RFC EDITOR: To be populated as vendors implement]</t>

</section>
<section anchor="interoperability-testing-1"><name>Interoperability Testing</name>

<t><list style="symbols">
  <t><strong>Test Suite Location</strong>: IETF</t>
  <t><strong>Participating Organizations</strong>: IETF</t>
</list></t>

</section>
</section>
<section anchor="design-rationale"><name>Design Rationale</name>

<section anchor="algorithm-identifier-selection"><name>Algorithm Identifier Selection</name>

<t>The requested algorithm identifiers (-61, -62, -63) are:</t>

<t><list style="symbols">
  <t>In the range designated for experimental/informational use</t>
  <t>Sequential for the three parameter sets</t>
  <t>Not conflicting with existing registrations</t>
  <t>Consistent with the approach used for other PQC algorithms</t>
</list></t>

</section>
<section anchor="key-type-design"><name>Key Type Design</name>

<t>The SQIsign key type is intentionally simple:</t>

<t><list style="symbols">
  <t>Only two parameters (pub, priv) following minimalist design</t>
  <t>Binary encoding (bstr) for efficiency</t>
  <t>No algorithm-specific encoding—raw bytes from SQIsign spec</t>
</list></t>

<t>This approach:
- Minimizes CBOR encoding overhead (critical for constrained devices)
- Simplifies implementation
- Provides future flexibility for parameter set evolution</t>

</section>
</section>
<section anchor="change-log"><name>Change Log</name>

<t>[RFC Editor Note:** Please remove this section before publication]</t>

<section anchor="draft-mott-cose-sqisign-03"><name>draft-mott-cose-sqisign-03</name>

<t><list style="symbols">
  <t>Incorporated technical corrections and feedback from Luca De Feo on draft-00</t>
  <t>Updated the Abstract and Introduction to utilize more neutral, objective language</t>
  <t>Removed vendor-specific branding in favor of generic cryptographic terminology</t>
  <t>fixed various formatting issues</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

