<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 4.0.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mott-cose-sqisign-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="cose-sqisign">CBOR Object Signing and Encryption (COSE) and
JSON Object Signing and Encryption (JOSE)
Registrations for SQIsign</title>

    <author initials="A. R." surname="Mott" fullname="Antony R. Mott">
      <organization>RustyKey</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>antony@rustykey.io</email>
      </address>
    </author>

    <date year="2026" month="April" day="29"/>

    <area>SEC</area>
    <workgroup>COSE</workgroup>
    <keyword>post-quantum cryptography</keyword> <keyword>isogeny-based cryptography</keyword> <keyword>constrained devices</keyword> <keyword>IoT security</keyword>

    <abstract>


<?line 92?>

<t><strong>NOTE: This document describes a signature scheme based on an algorithm currently under evaluation in the NIST Post-Quantum Cryptography standardization process. Be aware that the underlying primitive may change as a result of that process.</strong></t>

<t>This document specifies the algorithm encodings and representations for the SQIsign digital signature scheme within the CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) frameworks.</t>

<t>SQIsign is an isogeny-based post-quantum signature scheme that provides the most compact signature and public key sizes of any candidate in the NIST Post-Quantum Cryptography (PQC) standardization and on-ramp-to-standardization processes.</t>

<t>The standardization of SQIsign will be helpful to address current infrastructure bottlenecks, specifically the FIDO2 CTAP2 specification used by billions of in-service devices and browser installations. Depending on authenticator implementation, transport (USB/NFC/BLE) and message fragmentation support, CTAP2 may default to a 1024-byte default limit for external key communication. Some standardized post-quantum signature schemes increase message sizes and may stress constrained authenticators or transports. As a result CBOR-encoded messages may hit limits in some authenticators. SQIsign-L1, L2 and L5 signatures are small enough to enable delivery over constrained networks like 802.15.4 and may be more suitable for constrained networks due to smaller signature sizes.</t>

<t>This document clarifies that SQIsign's security relies on the general supersingular isogeny problem and is fundamentally unaffected by the torsion-point attacks that deprecated the SIDH/SIKE key exchange. By establishing stable COSE and JOSE identifiers, this document ensures the interoperability required for the seamless integration of post-quantum security into high-density, bandwidth-constrained, and legacy-compatible hardware environments.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mott-cose-sqisign/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        COSE Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/antonymott/quantum-resistant-rustykey"/>.</t>
    </note>


  </front>

  <middle>


<?line 104?>

<section anchor="introduction"><name>Introduction</name>

<t>This document registers algorithm identifiers and key type parameters for SQIsign in COSE and JOSE.</t>

<section anchor="background-and-motivation"><name>Background and Motivation</name>

<t>Post-quantum cryptography readiness is critical for constrained devices. As of 2026, while FIDO2/WebAuthn supports various COSE algorithms, some hardware authenticators and platform authenticators (like TPMs) have strict memory/storage constraints, effectively limiting public keys to 1024 bytes or less, hindering the adoption of large-key post-quantum algorithms.</t>

<section anchor="pressing-need-for-smaller-pqc-signatures"><name>Pressing Need for Smaller PQC Signatures</name>

<t>FN-DSA (Falcon) and ML-DSA (Dilithium) have larger signatures that may not fit in constrained environments.</t>

<t>The fundamental differences between ML-DSA, FN-DSA, and SQIsign lie in their underlying hard mathematical problems, implementation complexity, and performance trade-offs.</t>

<t>Falcon (NIST secondary) uses NTRU lattices to achieve very small signatures and fast verification, but requires complex floating-point math. Dilithium (NIST primary) is a balanced, high-efficiency lattice scheme using Module-LWE/SIS, easy to implement.</t>

<t>SQIsign <xref target="SQIsign-Spec"/> <xref target="SQIsign-Analysis"/> is a non-lattice, isogeny-based scheme that offers the smallest signature sizes but suffers from significantly slower signature generation where even vI may take seconds to minutes, or longer with WASM implementations for browsers of particular relevance to signatures required for WebAuthn PassKeys <xref target="WebAuthn-PQC-Signature-size-constraints"/>. SQIsign is an isogeny-based digital signature scheme participating in NIST's Round 2 Additional Digital Signature Schemes, not yet a NIST standard <xref target="NIST-Finalized-Standards"/>.</t>

<t>Speed: SQIsign is significantly slower at signing (roughly 100x to 1000x) compared to ML-DSA, though the math is changing fast and variants improve this.</t>

<texttable>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Public Key Size</ttcol>
      <ttcol align='left'>Signature Size</ttcol>
      <ttcol align='left'>PK + Sig Fits &lt; 1024?</ttcol>
      <c>ML-DSA-44</c>
      <c>1,312 bytes</c>
      <c>2,420 bytes</c>
      <c>❌</c>
      <c>ML-DSA-65</c>
      <c>1,952 bytes</c>
      <c>3,293 bytes</c>
      <c>❌</c>
      <c>ML-DSA-87</c>
      <c>2,592 bytes</c>
      <c>4,595 bytes</c>
      <c>❌</c>
      <c>FN-DSA-512</c>
      <c>897 bytes</c>
      <c>666 bytes</c>
      <c>❌ (1,563 total)</c>
      <c>FN-DSA-1024</c>
      <c>1,793 bytes</c>
      <c>1,280 bytes</c>
      <c>❌</c>
      <c>SQIsign-L1</c>
      <c>65 bytes</c>
      <c>148 bytes</c>
      <c>✅ (213 total)</c>
      <c>SQIsign-L3</c>
      <c>97 bytes</c>
      <c>224 bytes</c>
      <c>✅ (321 total)</c>
      <c>SQIsign-L5</c>
      <c>129 bytes</c>
      <c>292 bytes</c>
      <c>✅ (421 total)</c>
</texttable>

</section>
<section anchor="estimated-constrained-device-footprint"><name>Estimated Constrained Device Footprint</name>

<t>The total addressable market for SQIsign in constrained devices is estimated at ~6.25 billion units.</t>

<section anchor="device-category-breakdown"><name>Device Category Breakdown</name>

<section anchor="legacy-hardware-security-keys-120-150-million"><name>Legacy Hardware Security Keys: ~120 - 150 million</name>
<t><list style="symbols">
  <t>Security keys in Service: ~120 - 150 million legacy keys in active circulation (Series 5 and older). Some firmware introduced PQC readiness. Some older keys cannot be updated to increase buffer sizes.</t>
</list></t>

</section>
<section anchor="constrained-tpms-and-platform-modules-11-billion"><name>Constrained TPMs and Platform Modules: ~1.1 billion</name>
<t>Trusted Platform Modules (TPMs) are integrated into PCs and servers, but their WebAuthn implementation often inherits protocol-level constraints. Estimated ~2.5 billion active chips worldwide. Constrained Subset: We estimate ~1.1 billion of these are in older Windows 10/11 or Linux machines where the OS "virtual authenticator" or TPM driver still enforces the 1024-byte message default to maintain backward compatibility with external CTAP1/2 tools.</t>

</section>
<section anchor="browser-and-software-implementations-5-billion"><name>Browser and Software Implementations: ~5 billion</name>
<t>This category refers to the "User-Agent" layer that mediates between the web and the hardware.
Global Browser Agents: There are over 5 billion active browser instances across mobile and desktop (Chrome, Safari, Edge, Firefox). Legacy Protocols: Even on modern hardware, browsers often use the FIDO2 CTAP2 specification which, unless explicitly negotiated for larger messages, maintains a 1024-byte default for external key communication.</t>

</section>
<section anchor="critical-infrastructure-300-million-includes-energy-electric-nuclear-oil-gas-water-wastewater-transportation-systems-communications-government-emergency-services-healthcare-and-financial-services"><name>Critical Infrastructure: ~300 Million includes Energy (electric, nuclear, oil, gas), Water &amp; Wastewater, Transportation Systems, Communications, Government, Emergency Services, Healthcare and Financial Services</name>
<t>Industrial/Government: Agencies like the U.S. Department of Defense rely on high-security FIPS-certified keys that are notoriously slow to upgrade. We estimate ~50 million "frozen" government keys. IoT Security: Of the ~21 billion connected IoT devices in 2026, only a fraction use WebAuthn. However, for those that do (smart locks, secure gateways), approximately 250 million are estimated to use older, non-upgradable secure elements limited to 1024-byte payloads. Recent government-level initiatives highlight the necessity to "...effectively deprecate the use of RSA, Diffie-Hellman (DH), and elliptic curve cryptography (ECDH and ECDSA) when mandated." <xref target="CNSA-2"/>, Page 4.</t>

</section>
</section>
</section>
<section anchor="pressing-need-limit-or-stop-harvest-now-decrypt-later-attacks"><name>Pressing need: Limit or Stop 'Harvest now; decrypt later' Attacks</name>
<t>Adversaries are collecting encrypted data today to decrypt when quantum computers become available. The transition to post-quantum cryptography (PQC) is critical for ensuring long-term security of digital communications against adversaries equipped with large-scale quantum computers. The National Institute of Standards and Technology (NIST) has been leading standardization efforts, having selected initial PQC algorithms and continuing to evaluate additional candidates.</t>

<t>CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/> is specifically designed for constrained node networks and IoT environments where bandwidth, storage, and computational resources are limited. The compact nature of SQIsign makes it an ideal candidate for COSE deployments.</t>

</section>
</section>
<section anchor="scope-and-status"><name>Scope and Status</name>

<t>This document is published on the <strong>Standards</strong> track rather than Informational Track for the following reasons:</t>

<t><list style="numbers" type="1">
  <t><strong>Algorithm Maturity</strong>: SQIsign is currently undergoing evaluation in NIST's on-ramp process</t>
  <t><strong>Continued Cryptanalysis</strong>: The algorithm has active ongoing review by the cryptographic research community, including the IRTF CFRG</t>
  <t><strong>High anticipated demand</strong>: This specification enables experimentation and early deployment to gather implementation experience</t>
</list></t>

<t><strong>This document does not represent Working Group consensus on algorithm innovation.</strong> The COSE and JOSE working groups focus on algorithm <em>integration</em> and <em>encoding</em>, not cryptographic algorithm design. The cryptographic properties of SQIsign are being evaluated through NIST's process and academic peer review.</t>

</section>
<section anchor="relationship-to-other-work"><name>Relationship to Other Work</name>

<t>This document follows the precedent established by <xref target="I-D.ietf-cose-falcon"/> and <xref target="I-D.ietf-cose-dilithium"/> for integrating NIST PQC candidate algorithms into COSE and JOSE. The structure and approach are intentionally aligned to provide consistency across post-quantum signature scheme integrations.</t>

</section>
<section anchor="constrained-device-applicability"><name>Constrained Device Applicability</name>
<t>SQIsign is particularly attractive for:</t>

<t><list style="symbols">
  <t><strong>IoT sensors</strong> with limited flash memory</t>
  <t><strong>Firmware updates</strong> over low-bandwidth networks (LoRaWAN, NB-IoT)</t>
  <t><strong>Embedded certificates</strong> in constrained devices</t>
  <t><strong>Blockchain and DLT</strong> where transaction size affects fees</t>
  <t><strong>Satellite communications</strong> with bandwidth constraints</t>
</list></t>

</section>
</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>This document uses the following terms:</t>

<t><list style="symbols">
  <t><strong>PQC</strong>: Post-Quantum Cryptography</t>
  <t><strong>COSE</strong>: CBOR Object Signing and Encryption</t>
  <t><strong>JOSE</strong>: JSON Object Signing and Encryption</t>
  <t><strong>JWS</strong>: JSON Web Signature</t>
  <t><strong>JWK</strong>: JSON Web Key</t>
  <t><strong>CBOR</strong>: Concise Binary Object Representation <xref target="RFC7049"/></t>
  <t><strong>ECDH</strong>: Elliptic Curve Diffie-Hellman</t>
  <t><strong>IANA</strong>: Internet Assigned Numbers Authority</t>
</list></t>

</section>
<section anchor="resistance-to-torsion-point-attack"><name>Resistance to "Torsion Point" attack</name>

<section anchor="sike-vulnerability-the-torsion-point-attack-of-2022"><name>SIKE Vulnerability (The "Torsion Point" Attack) of 2022</name>

<t>SIKE (Supersingular Isogeny Key Encapsulation) was a key exchange, more specifically, a Key Encapsulation Mechanism (KEM). In the SIKE protocol, users had to share more than just the target elliptic curve. To make the math work for key exchange, they shared the images of specific points (called torsion points) under the secret isogeny.
- The Info: If the secret isogeny is 𝜙, SIKE gave away 𝜙(𝑃) and 𝜙(𝑄) for specific basis points 𝑃 and 𝑄.
- The Break: In 2022, Castryck and Decru showed that this auxiliary information allowed an attacker to "glue" the elliptic curves together into a higher-dimensional surface (an Abelian surface). In this higher dimension, the secret isogeny became a path that could be computed efficiently using the "Kani’s Lemma" approach.
- The Oversight: For years, cryptanalysts thought this extra info was harmless, but had missed the math to break it had existed in related techniques existed in algebraic geometry literature, and no one had applied it to cryptography.</t>

</section>
<section anchor="why-sqisign-appears-unaffected-by-the-sike-vulnerability"><name>Why SQISign appears unaffected by the SIKE Vulnerability</name>

<t>SQISign is built differently. It is a digital signature scheme, not a key exchange.
- does not expose torsion-point images in the same way as SIKE.</t>

</section>
</section>
<section anchor="sqisign-algorithm-overview"><name>SQIsign Algorithm Overview</name>

<section anchor="cryptographic-foundation"><name>Cryptographic Foundation</name>

<t>SQIsign is based on the hardness of finding isogenies between supersingular elliptic curves over finite fields. The security assumption relies primarily on the difficulty of the <strong>Isogeny Path Problem</strong></t>

<t>Unlike lattice-based schemes, isogeny-based cryptography offers:</t>

<t><list style="symbols">
  <t><strong>Smaller key and signature sizes</strong></t>
  <t><strong>Algebraic structure</strong> based on elliptic curve isogenies</t>
  <t><strong>Different security assumptions</strong> (diversification from lattice-based schemes)</t>
</list></t>

</section>
<section anchor="security-levels"><name>Security Levels</name>

<t>SQIsign is defined with three parameter sets corresponding to NIST security levels:</t>

<texttable>
      <ttcol align='left'>Parameter Set</ttcol>
      <ttcol align='left'>NIST Level</ttcol>
      <ttcol align='left'>Public Key</ttcol>
      <ttcol align='left'>Signature</ttcol>
      <ttcol align='left'>Classical Sec</ttcol>
      <c>SQIsign-L1</c>
      <c>I</c>
      <c>65 bytes</c>
      <c>148 bytes</c>
      <c>~128 bits</c>
      <c>SQIsign-L3</c>
      <c>III</c>
      <c>97 bytes</c>
      <c>224 bytes</c>
      <c>~192 bits</c>
      <c>SQIsign-L5</c>
      <c>V</c>
      <c>129 bytes</c>
      <c>292 bytes</c>
      <c>~256 bits</c>
</texttable>

</section>
<section anchor="performance-characteristics"><name>Performance Characteristics</name>

<t><list style="symbols">
  <t><strong>Signing</strong>: Computationally intensive (slower than lattice schemes)</t>
  <t><strong>Verification</strong>: Moderate computational cost</t>
  <t><strong>Key Generation</strong>: Intensive computation required</t>
  <t><strong>Size</strong>: Exceptional efficiency (10 - 20x smaller than lattice alternatives)</t>
</list></t>

<t><strong>Recommended Use Cases:</strong>
- Sign-once, verify-many scenarios (firmware, certificates)
- Bandwidth-constrained environments
- Storage-limited devices
- Applications where signature/key size dominates performance considerations</t>

</section>
</section>
<section anchor="cose-integration"><name>COSE Integration</name>

<t>This section defines the identifiers for SQIsign in COSE <xref target="RFC8152"/>.</t>

<section anchor="sqisign-algorithms"><name>SQIsign Algorithms</name>

<t>The algorithms defined in this document are:</t>

<t><list style="symbols">
  <t>SQIsign-L1: SQIsign NIST Level I (suggested value -61)</t>
  <t>SQIsign-L3: SQIsign NIST Level III (suggested value -62)</t>
  <t>SQIsign-L5: SQIsign NIST Level V (suggested value -63)</t>
</list></t>

</section>
<section anchor="sqisign-key-types"><name>SQIsign Key Types</name>

<t>A new key type is defined for SQIsign with the name "SQIsign".</t>

</section>
<section anchor="sqisign-key-parameters"><name>SQIsign Key Parameters</name>

<t>SQIsign keys use the following COSE Key common parameters:</t>

<texttable>
      <ttcol align='left'>Key Parameter</ttcol>
      <ttcol align='left'>COSE Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>kty</c>
      <c>1</c>
      <c>int</c>
      <c>Key type: IETF (SQIsign)</c>
      <c>kid</c>
      <c>2</c>
      <c>bstr</c>
      <c>Key ID (optional)</c>
      <c>alg</c>
      <c>3</c>
      <c>int</c>
      <c>Algorithm identifier (-61, -62, or -63)</c>
      <c>key_ops</c>
      <c>4</c>
      <c>array</c>
      <c>Key operations (<spanx style="verb">sign</spanx>, <spanx style="verb">verify</spanx>)</c>
</texttable>

</section>
<section anchor="sqisign-specific-key-parameters"><name>SQIsign-Specific Key Parameters</name>

<texttable>
      <ttcol align='left'>Key Parameter</ttcol>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>pub</c>
      <c>-1</c>
      <c>bstr</c>
      <c>SQIsign public key</c>
      <c>priv</c>
      <c>-2</c>
      <c>bstr</c>
      <c>SQIsign private key (sensitive)</c>
</texttable>

</section>
<section anchor="cose-key-format-examples"><name>COSE Key Format Examples</name>

<section anchor="public-key-cosekey"><name>Public Key (COSE_Key)</name>

<t><spanx style="verb">cbor
{
  1: IETF,              / kty: SQIsign /
  3: -61,              / alg: SQIsign-L1 /
  -1: h'[PUBLIC_KEY]'  / pub: SQIsign public key bytes /
}
</spanx></t>

</section>
<section anchor="private-key-cosekey"><name>Private Key (COSE_Key)</name>

<t><spanx style="verb">cbor
{
  1: IETF,               / kty: SQIsign /
  3: -61,               / alg: SQIsign-L1 /
  -1: h'[PUBLIC_KEY]',  / pub: SQIsign public key bytes /
  -2: h'[PRIVATE_KEY]'  / priv: SQIsign private key bytes /
}
</spanx></t>

</section>
</section>
<section anchor="cose-signature-format"><name>COSE Signature Format</name>

<t>SQIsign signatures in COSE follow the standard COSE_Sign1 structure <xref target="RFC9052"/>:</t>

<t><spanx style="verb">
COSE_Sign1 = [
    protected: bstr .cbor header_map,
    unprotected: header_map,
    payload: bstr / nil,
    signature: bstr
]
</spanx></t>

<t>The <spanx style="verb">signature</spanx> field contains the raw SQIsign signature bytes.</t>

<section anchor="protected-headers"><name>Protected Headers</name>

<t>The protected header <bcp14>MUST</bcp14> include:</t>

<t><spanx style="verb">cbor
{
  1: -61  / alg: SQIsign-L1, -62 for L3, -63 for L5 /
}
</spanx></t>

</section>
<section anchor="example-cosesign1-structure"><name>Example COSE_Sign1 Structure</name>

<t><spanx style="verb">cbor
18(                                  / COSE_Sign1 tag /
  [
    h'A10139003C',                   / protected: {"alg": -61} /
    {},                              / unprotected /
    h'546869732069732074686520636F6E74656E742E', / payload /
    h'[SQISIGN_SIGNATURE_BYTES]'     / signature /
  ]
)
</spanx></t>

</section>
</section>
</section>
<section anchor="jose-integration"><name>JOSE Integration</name>

<section anchor="json-web-signature-jws-algorithm-registration"><name>JSON Web Signature (JWS) Algorithm Registration</name>

<t>The following algorithm identifiers are registered for use in the JWS "alg" header parameter for JSON Web Signatures <xref target="RFC7515"/>:</t>

<texttable>
      <ttcol align='left'>Algorithm Name</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Implementation Requirements</ttcol>
      <c>SQIsign-L1</c>
      <c>SQIsign NIST Level I</c>
      <c>Optional</c>
      <c>SQIsign-L3</c>
      <c>SQIsign NIST Level III</c>
      <c>Optional</c>
      <c>SQIsign-L5</c>
      <c>SQIsign NIST Level V</c>
      <c>Optional</c>
</texttable>

</section>
<section anchor="json-web-key-jwk-representation"><name>JSON Web Key (JWK) Representation</name>

<t>SQIsign keys are represented in JWK <xref target="RFC7517"/> format as follows:</t>

<section anchor="public-key-parameters"><name>Public Key Parameters</name>

<texttable>
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>kty</c>
      <c>string</c>
      <c>Key type: "SQIsign"</c>
      <c>alg</c>
      <c>string</c>
      <c>Algorithm: "SQIsign-L1", "SQIsign-L3", or "SQIsign-L5"</c>
      <c>pub</c>
      <c>string</c>
      <c>Base64url-encoded public key</c>
      <c>kid</c>
      <c>string</c>
      <c>Key ID (optional)</c>
      <c>use</c>
      <c>string</c>
      <c>Public key use: "sig" (optional)</c>
      <c>key_ops</c>
      <c>array</c>
      <c>Key operations: [verify] (optional)</c>
</texttable>

</section>
<section anchor="private-key-parameters"><name>Private Key Parameters</name>

<t>Private keys include all public key parameters plus:</t>

<texttable>
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>priv</c>
      <c>string</c>
      <c>Base64url-encoded private key</c>
</texttable>

</section>
</section>
<section anchor="jwk-examples"><name>JWK Examples</name>

<section anchor="public-key-jwk-example"><name>Public Key (JWK) Example</name>

<t><spanx style="verb">json
{
  "kty": "SQIsign",
  "alg": "SQIsign-L1",
  "pub": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_\
    5xZuqgMwkaeJhM94YHi_-2UsQllbnmm-W4XFSLm2hUwiMylrAh0",
  "kid": "2027-01-device-key",
  "use": "sig",
  "key_ops": ["verify"]
}
</spanx></t>

</section>
<section anchor="private-key-jwk-example"><name>Private Key (JWK) Example</name>

<t><spanx style="verb">json
{
  "kty": "SQIsign",
  "alg": "SQIsign-L1",
  "pub": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_\
    5xZuqgMwkaeJhM94YHi_-2UsQllbnmm-W4XFSLm2hUwiMylrAh0",
  "priv": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_5xZuqgMwkaeJhM94YHi_\
    -2UsQllbnmm-W4XFSLm2hUwiMylrAh1VwP9vNkBZH0Bjj2wc-\
    p7sUgQAAAAAAAAAAAAAAAAAAN68tviJbcCpQ84fh-4IJB4-\
    ____________________P38m3fKOhfhMspQU9GmA4CD5___\
    _______________________________________________\
    ___________wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\
    AAAAAAA5cP9aha40v-8mFd_bdAgpR93Ug2iPhu4_NxG97C7\
    8wBvVMGOrQTCli7NxrR2KlPZR1AC5VddGf4p-ZjCzrWfAJv\
    xhEh4uOKXq1MmuS9TwZGuz1YIYMIguu1wqjdmfaQAfOmK2g\
    WWO3vcld5s7GR2AcrTv65ocK_pVUWY8eJDcQA",
  "kid": "2027-01-device-key",
  "use": "sig",
  "key_ops": ["sign"]
}
</spanx></t>

</section>
</section>
<section anchor="jws-compact-serialization"><name>JWS Compact Serialization</name>

<t>A JWS using SQIsign follows the standard compact serialization:</t>

<t><spanx style="verb">
BASE64URL(UTF8(JWS Protected Header)) || '.' ||
BASE64URL(JWS Payload) || '.' ||
BASE64URL(JWS Signature)
</spanx></t>

<section anchor="example-jws-protected-header"><name>Example JWS Protected Header</name>

<t><spanx style="verb">json
{
  "alg": "SQIsign-L1",
  "typ": "JWT"
}
</spanx></t>

<t>Base64url-encoded: <spanx style="verb">eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0</spanx></t>

</section>
<section anchor="complete-jws-example"><name>Complete JWS Example</name>

<t><spanx style="verb">
eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0
.
[BASE64URL_PAYLOAD]
.
[BASE64URL_SQISIGN_SIGNATURE]
</spanx></t>

</section>
</section>
</section>
<section anchor="implementation-considerations"><name>Implementation Considerations</name>

<section anchor="signature-and-key-generation"><name>Signature and Key Generation</name>

<t>Implementations <bcp14>MUST</bcp14> follow the SQIsign specification <xref target="SQIsign-Spec"/> for:</t>

<t><list style="symbols">
  <t>Key pair generation</t>
  <t>Signature generation</t>
  <t>Signature verification</t>
</list></t>

</section>
<section anchor="randomness-requirements"><name>Randomness Requirements</name>

<t>SQIsign signature generation requires high-quality randomness. Implementations <bcp14>MUST</bcp14> use a cryptographically secure random number generator (CSRNG) compliant with <xref target="RFC4086"/> or equivalent.</t>

</section>
<section anchor="side-channel-protections"><name>Side-Channel Protections</name>

<t>Implementations <bcp14>SHOULD</bcp14> implement protections against:</t>

<t><list style="symbols">
  <t>Timing attacks</t>
  <t>Power analysis</t>
  <t>Fault injection attacks</t>
</list></t>

<t>Particularly for constrained devices deployed in physically accessible environments.</t>

</section>
<section anchor="performance-trade-offs"><name>Performance Trade-offs</name>

<t>Implementers should be aware:</t>

<t><list style="symbols">
  <t><strong>Signing is computationally expensive</strong>: Consider pre-signing or batch operations</t>
  <t><strong>Verification is moderate</strong>: Suitable for resource-constrained verifiers</t>
  <t><strong>Size is exceptional</strong>: Minimizes bandwidth and storage</t>
</list></t>

</section>
<section anchor="interoperability-testing"><name>Interoperability Testing</name>

<t>Early implementations <bcp14>SHOULD</bcp14> participate in interoperability testing to ensure:</t>

<t><list style="symbols">
  <t>Consistent signature generation and verification</t>
  <t>Proper encoding in COSE and JOSE formats</t>
  <t>Cross-platform compatibility</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="algorithm-security"><name>Algorithm Security</name>

<t>The security of SQIsign relies primarily on the hardness of finding isogenies between supersingular elliptic curves.</t>

<t>These assumptions are <strong>different from lattice-based schemes</strong>, providing cryptographic diversity in the post-quantum landscape.</t>

</section>
<section anchor="quantum-security"><name>Quantum Security</name>

<t>SQIsign is designed to resist attacks by large-scale quantum computers. The three parameter sets provide security equivalent to AES-128, AES-192, and AES-256 against both classical and quantum adversaries.</t>

</section>
<section anchor="current-cryptanalysis-status"><name>Current Cryptanalysis Status</name>

<t>As of this writing, SQIsign is undergoing active cryptanalytic review:</t>

<t><list style="symbols">
  <t><strong>NIST Round 2 evaluation</strong>: <xref target="NIST-Finalized-Standards"/></t>
  <t><strong>Academic research</strong>: Ongoing analysis of isogeny-based cryptography</t>
  <t><strong>Known attacks</strong>: No practical breaks of the security assumptions</t>
</list></t>

<t><strong>Implementers are advised</strong>:
- Monitor NIST announcements and updates
- Follow academic literature on isogeny cryptanalysis
- Be prepared to deprecate or update as cryptanalysis evolves</t>

</section>
<section anchor="implementation-security"><name>Implementation Security</name>

<section anchor="random-number-generation"><name>Random Number Generation</name>

<t>Poor randomness can completely compromise SQIsign security. Implementations <bcp14>MUST</bcp14> use robust CSRNGs, especially on constrained devices with limited entropy sources.</t>

</section>
<section anchor="side-channel-resistance"><name>Side-Channel Resistance</name>

<t>Constrained devices may be physically accessible to attackers. Implementations <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Use constant-time algorithms where possible</t>
  <t>Implement countermeasures against DPA/SPA</t>
  <t>Consider fault attack mitigations</t>
</list></t>

</section>
<section anchor="key-management"><name>Key Management</name>

<t><list style="symbols">
  <t>Private keys <bcp14>MUST</bcp14> be protected with appropriate access controls</t>
  <t>Consider hardware security modules (HSMs) or secure elements for key storage</t>
  <t>Implement key rotation policies appropriate to the deployment</t>
</list></t>

</section>
</section>
<section anchor="cryptographic-agility"><name>Cryptographic Agility</name>

<t>Organizations deploying SQIsign <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Maintain hybrid deployments with classical algorithms during transition</t>
  <t>Plan for algorithm migration if cryptanalysis reveals weaknesses</t>
  <t>Monitor NIST and IRTF guidance on PQC deployment</t>
</list></t>

</section>
<section anchor="constrained-device-specific-risks"><name>Constrained Device Specific Risks</name>

<t>IoT devices face unique challenges:</t>

<t><list style="symbols">
  <t><strong>Physical access</strong>: Devices may be deployed in hostile environments</t>
  <t><strong>Limited update capability</strong>: Firmware updates may be infrequent or impossible</t>
  <t><strong>Long deployment lifetimes</strong>: Devices may operate for 10+ years</t>
</list></t>

<t>Design systems with:
- Defense in depth (multiple security layers)
- Remote update capability when possible
- Graceful degradation if algorithm is compromised</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<t>IANA is requested to add the following entries to the COSE and JOSE registries. The following completed registration actions are provided as described in <xref target="RFC9053"/> and <xref target="RFC9054"/>.</t>

<section anchor="new-cose-algorithms"><name>New COSE Algorithms</name>

<t>IANA is requested to register the following entries in the "COSE Algorithms" registry:</t>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Capabilities</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <ttcol align='left'>Rec'd</ttcol>
      <c>SQIsign-L1</c>
      <c>-61</c>
      <c>SQIsign NIST L I</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L3</c>
      <c>-62</c>
      <c>SQIsign NIST L III</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L5</c>
      <c>-63</c>
      <c>SQIsign NIST L V</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
</texttable>

</section>
<section anchor="new-cose-key-types"><name>New COSE Key Types</name>

<t>IANA is requested to register the following entry in the "COSE Key Types" registry:</t>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Capabilities</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>SQIsign pub key</c>
      <c>sign, verify</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-cose-key-type-parameters"><name>New COSE Key Type Parameters</name>

<t>IANA is requested to register the following entries in the "COSE Key Type Parameters" registry:</t>

<texttable>
      <ttcol align='left'>Key Type</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SQIsign</c>
      <c>pub</c>
      <c>-1</c>
      <c>bstr</c>
      <c>Public key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>SQIsign</c>
      <c>priv</c>
      <c>-2</c>
      <c>bstr</c>
      <c>Private key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-jws-algorithms"><name>New JWS Algorithms</name>

<t>IANA is requested to register the following entries in the "JSON Web Signature and Encryption Algorithms" registry:</t>

<texttable>
      <ttcol align='left'>Algorithm Name</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Impl Req</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <c>SQIsign-L1</c>
      <c>SQIsign NIST L I</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L3</c>
      <c>SQIsign NIST L III</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L5</c>
      <c>SQIsign NIST L V</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
</texttable>

</section>
<section anchor="new-json-web-key-types"><name>New JSON Web Key Types</name>

<t>IANA is requested to register the following entry in the "JSON Web Key Types" registry:</t>

<texttable>
      <ttcol align='left'>"kty" Param Value</ttcol>
      <ttcol align='left'>Key Type Desc</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SQIsign</c>
      <c>SQIsign public key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-json-web-key-parameters"><name>New JSON Web Key Parameters</name>

<t>IANA is requested to register the following entries in the "JSON Web Key Parameters" registry:</t>

<texttable>
      <ttcol align='left'>Param Name</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Used with "kty" Val</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>pub</c>
      <c>Public key</c>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>priv</c>
      <c>Private key</c>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank:
- Luca DeFeo for reviewing draft-00 and providing valuable feedback. Any remaining errors are solely the responsibility of the authors.
- The SQIsign design team for groundbreaking work on isogeny-based signatures
- The NIST PQC team for managing the standardization process
- The COSE and JOSE working groups for guidance on integration
- The IRTF Crypto Forum Research Group for ongoing cryptanalytic review
- Early implementers who provide valuable feedback</t>

<t>This work builds upon the template established by <xref target="I-D.ietf-cose-falcon"/> and similar PQC integration efforts.</t>

</section>
<section anchor="references"><name>References</name>

<section anchor="normative-references"><name>Normative References</name>

<t><em>Populated automatically from metadata</em></t>

</section>
<section anchor="informative-references"><name>Informative References</name>

<t><em>Populated automatically from metadata</em></t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC7515">
  <front>
    <title>JSON Web Signature (JWS)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7515"/>
  <seriesInfo name="DOI" value="10.17487/RFC7515"/>
</reference>
<reference anchor="RFC7517">
  <front>
    <title>JSON Web Key (JWK)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7517"/>
  <seriesInfo name="DOI" value="10.17487/RFC7517"/>
</reference>
<reference anchor="RFC8152">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8152"/>
  <seriesInfo name="DOI" value="10.17487/RFC8152"/>
</reference>
<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>
<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>
<reference anchor="RFC9054">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9054"/>
  <seriesInfo name="DOI" value="10.17487/RFC9054"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4086">
  <front>
    <title>Randomness Requirements for Security</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="J. Schiller" initials="J." surname="Schiller"/>
    <author fullname="S. Crocker" initials="S." surname="Crocker"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
      <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="106"/>
  <seriesInfo name="RFC" value="4086"/>
  <seriesInfo name="DOI" value="10.17487/RFC4086"/>
</reference>
<reference anchor="RFC7049">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7049"/>
  <seriesInfo name="DOI" value="10.17487/RFC7049"/>
</reference>

<reference anchor="I-D.ietf-cose-falcon">
   <front>
      <title>FN-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>mesur.io</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Tradeverifyd</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of the Bundeswehr Munich</organization>
      </author>
      <date day="15" month="March" year="2026"/>
      <abstract>
	 <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for FFT
   (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature
   Algorithm (FN-DSA), a Post-Quantum Cryptography (PQC) digital
   signature scheme defined in US NIST FIPS 206 (expected to be
   published in late 2026 early 2027).

   It does not define new cryptographic primitives; rather, it specifies
   how existing FN-DSA mechanisms are serialized for use in JOSE and
   COSE.  This document registers signature algorithms for JOSE and
   COSE, specifically FN-DSA-512 and FN-DSA-1024.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-falcon-04"/>
   
</reference>

<reference anchor="I-D.ietf-cose-dilithium">
   <front>
      <title>ML-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>Tradeverifyd</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Tradeverifyd</organization>
      </author>
      <date day="15" month="November" year="2025"/>
      <abstract>
	 <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
   
</reference>

<reference anchor="SQIsign-Spec" target="https://sqisign.org/spec/sqisign-20250205.pdf">
  <front>
    <title>SQIsign: Compact Post-Quantum Signatures from Quaternions and Isogenies (Round 2)</title>
    <author initials="" surname="SQIsign team">
      <organization></organization>
    </author>
    <date year="2025" month="February"/>
  </front>
</reference>
<reference anchor="NIST-Finalized-Standards" target="https://www.nist.gov/news-events/news/2024/08/
nist-releases-first-3-finalized-post-quantum-encryption-standards
">
  <front>
    <title>"NIST Releases First 3 Finalized
Post-Quantum Encryption Standards"</title>
    <author >
      <organization>NIST</organization>
    </author>
    <date year="2024" month="August"/>
  </front>
</reference>
<reference anchor="SQIsign-Analysis" target="https://eprint.iacr.org/2020/1240">
  <front>
    <title>"SQIsign: Compact Post-Quantum Signatures
from Quaternions and Isogenies"</title>
    <author >
      <organization>IACR ePrint Archive</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="CNSA-2" target="https://media.defense.gov/2025/May/30/
2003728741/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS.PDF
">
  <front>
    <title>Commercial National Security Algorithm Suite 2.0</title>
    <author >
      <organization>National Security Agency</organization>
    </author>
    <date year="2025" month="May"/>
  </front>
</reference>
<reference anchor="WebAuthn-PQC-Signature-size-constraints" target="https://www.npmjs.com/package/quantum-resistant-rustykey">
  <front>
    <title>WebAuthn PQC Signature size constraints</title>
    <author >
      <organization>University of Quantum Science</organization>
    </author>
    <date year="2026" month="April"/>
  </front>
</reference>


    </references>

</references>


<?line 655?>

<section anchor="test-vectors"><name>Test Vectors</name>

<section anchor="sqisign-l1-test-vectors"><name>SQIsign-L1 Test Vectors</name>

<section anchor="example-1-simple-message-signing"><name>Example 1: Simple Message Signing</name>

<t>The following test vector exhibits a SQIsign Level I signature over a short message.</t>

<t>Message (hex): <spanx style="verb">d81c4d8d734fcbfbeade3d3f8a039faa2a2c9957e835ad55b2 \
2e75bf57bb556ac8</spanx>
Message (ASCII): <spanx style="verb">MsO=?*,W5U.uWUj</spanx></t>

<t>Public Key (hex): <spanx style="verb">07CCD21425136F6E865E497D2D4D208F0054AD81372066E \
817480787AAF7B2029550C89E892D618CE3230F23510BFBE68FCCDDAEA51DB1436 \
B462ADFAF008A010B</spanx>
Public Key (Base64url): <spanx style="verb">B8zSFCUTb26GXkl9LU0gjwBUrYE3IGboF0gHh6r3s \
gKVUMieiS1hjOMjDyNRC_vmj8zdrqUdsUNrRirfrwCKAQs</spanx></t>

<t>Signature (hex): <spanx style="verb">84228651f271b0f39f2f19f2e8718f31ed3365ac9e5cb303 \
afe663d0cfc11f0455d891b0ca6c7e653f9ba2667730bb77befe1b1a3182840428 \
4af8fd7baacc010001d974b5ca671ff65708d8b462a5a84a1443ee9b5fed721876 \
7c9d85ceed04db0a69a2f6ec3be835b3b2624b9a0df68837ad00bcacc27d1ec806 \
a44840267471d86eff3447018adb0a6551ee8322ab30010202</spanx>
Signature (Base64url): <spanx style="verb">hCKGUfJxsPOfLxny6HGPMe0zZayeXLMDr-Zj0M_BHw \
RV2JGwymx-ZT-bomZ3MLt3vv4bGjGChAQoSvj9e6rMAQAB2XS1ymcf9lcI2LRipahK \
FEPum1_tchh2fJ2Fzu0E2wppovbsO-g1s7JiS5oN9og3rQC8rMJ9HsgGpEhAJnRx2G \
7_NEcBitsKZVHugyKrMAECAg</spanx></t>

</section>
<section anchor="cosesign1-complete-example"><name>COSE_Sign1 Complete Example</name>

<t><spanx style="verb">cbor
18(
  [
    h'a10139003c', / protected: {"alg": -61} /
    {},           / unprotected /
    h'd81c4d8d734fcbfbeade3d3f8a039faa2a2c9957e835ad55b22e75bf57bb \
    556ac8', / payload /
    h'84228651f271b0f39f2f19f2e8718f31ed3365ac9e5cb303afe663d0cfc1 \
    1f0455d891b0ca6c7e653f9ba2667730bb77befe1b1a31828404284af8fd7b \
    aacc010001d974b5ca671ff65708d8b462a5a84a1443ee9b5fed7218767c9d \
    85ceed04db0a69a2f6ec3be835b3b2624b9a0df68837ad00bcacc27d1ec806 \
    a44840267471d86eff3447018adb0a6551ee8322ab30010202'
  ]
)
</spanx></t>

</section>
<section anchor="jws-complete-example"><name>JWS Complete Example</name>

<t><spanx style="verb">
eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0
.
2BxNjXNPy_vq3j0_igOfqiosmVfoNa1Vsi51v1e7VWrI
.
hCKGUfJxsPOfLxny6HGPMe0zZayeXLMDr-Zj0M_BHwRV2JGwymx-ZT-bomZ3MLt3vv \
4bGjGChAQoSvj9e6rMAQAB2XS1ymcf9lcI2LRipahKFEPum1_tchh2fJ2Fzu0E2wpp \
ovbsO-g1s7JiS5oN9og3rQC8rMJ9HsgGpEhAJnRx2G7_NEcBitsKZVHugyKrMAECAg
</spanx></t>

</section>
</section>
<section anchor="sqisign-l3-test-vectors"><name>SQIsign-L3 Test Vectors</name>

<t><spanx style="verb">
[PLACEHOLDER FOR L3 TEST VECTORS]
</spanx></t>

</section>
<section anchor="sqisign-l5-test-vectors"><name>SQIsign-L5 Test Vectors</name>

<t><spanx style="verb">
[PLACEHOLDER FOR L5 TEST VECTORS]
</spanx></t>

</section>
</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>[RFC Editor: Please remove this section before publication]</t>

<t>This section records the status of known implementations at the time of writing.</t>

<section anchor="open-source-implementations"><name>Open Source Implementations</name>

<section anchor="reference-implementation"><name>Reference Implementation</name>

<t><list style="symbols">
  <t><strong>Organization</strong>: SQIsign team</t>
  <t><strong>Repository</strong>: https://github.com/SQISign/the-sqisign</t>
  <t><strong>Language</strong>: C</t>
  <t><strong>License</strong>: MIT</t>
  <t><strong>Status</strong>: Active development</t>
  <t><strong>COSE/JOSE Support</strong>: Not yet integrated</t>
</list></t>

</section>
<section anchor="rust-implementation"><name>Rust Implementation</name>

<t><list style="symbols">
  <t><strong>Organization</strong>: IETF - Community implementation</t>
  <t><strong>Repository</strong>: IETF</t>
  <t><strong>Language</strong>: Rust</t>
  <t><strong>License</strong>: IETF</t>
  <t><strong>COSE Support</strong>: Planned</t>
  <t><strong>Status</strong>: Development</t>
</list></t>

</section>
</section>
<section anchor="commercial-implementations"><name>Commercial Implementations</name>

<t>[RFC EDITOR: To be populated as vendors implement]</t>

</section>
<section anchor="interoperability-testing-1"><name>Interoperability Testing</name>

<t><list style="symbols">
  <t><strong>Test Suite Location</strong>: IETF</t>
  <t><strong>Participating Organizations</strong>: IETF</t>
</list></t>

</section>
</section>
<section anchor="design-rationale"><name>Design Rationale</name>

<section anchor="algorithm-identifier-selection"><name>Algorithm Identifier Selection</name>

<t>The requested algorithm identifiers (-61, -62, -63) are:</t>

<t><list style="symbols">
  <t>In the range designated for experimental/informational use</t>
  <t>Sequential for the three parameter sets</t>
  <t>Not conflicting with existing registrations</t>
  <t>Consistent with the approach used for other PQC algorithms</t>
</list></t>

</section>
<section anchor="key-type-design"><name>Key Type Design</name>

<t>The SQIsign key type is intentionally simple:</t>

<t><list style="symbols">
  <t>Only two parameters (pub, priv) following minimalist design</t>
  <t>Binary encoding (bstr) for efficiency</t>
  <t>No algorithm-specific encoding—raw bytes from SQIsign spec</t>
</list></t>

<t>This approach:
- Minimizes CBOR encoding overhead (critical for constrained devices)
- Simplifies implementation
- Provides future flexibility for parameter set evolution</t>

</section>
</section>
<section anchor="change-log"><name>Change Log</name>

<t>[RFC Editor Note:** Please remove this section before publication]</t>

<section anchor="draft-mott-cose-sqisign-01"><name>draft-mott-cose-sqisign-01</name>

<t><list style="symbols">
  <t>Incorporated technical corrections and feedback from Luca De Feo on draft-00</t>
  <t>Updated the Abstract and Introduction to utilize more neutral, objective language</t>
  <t>Removed vendor-specific branding in favor of generic cryptographic terminology</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

