<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 4.0.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mott-cose-sqisign-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="cose-sqisign">CBOR Object Signing and Encryption (COSE) and
JSON Object Signing and Encryption (JOSE)
Registrations for SQIsign</title>

    <author initials="A. R." surname="Mott" fullname="Antony R. Mott">
      <organization>RustyKey</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>antony@rustykey.io</email>
      </address>
    </author>

    <date year="2026" month="April" day="29"/>

    <area>SEC</area>
    <workgroup>COSE</workgroup>
    <keyword>post-quantum cryptography</keyword> <keyword>isogeny-based cryptography</keyword> <keyword>constrained devices</keyword> <keyword>IoT security</keyword>

    <abstract>


<?line 92?>

<t><strong>NOTE: This document describes a signature scheme based on an algorithm currently under evaluation in the NIST Post-Quantum Cryptography standardization process. Be aware that the underlying primitive may change as a result of that process.</strong></t>

<t>This document specifies the algorithm encodings and representations for the SQIsign digital signature scheme within the CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) frameworks.</t>

<t>SQIsign is an isogeny-based post-quantum signature scheme that provides the most compact signature and public key sizes of any candidate in the NIST Post-Quantum Cryptography (PQC) standardization and on-ramp-to-standardization processes.</t>

<t>The standardization of SQIsign will be helpful to address current infrastructure bottlenecks, specifically the FIDO2 CTAP2 specification used by billions of in-service devices and browser installations. Depending on authenticator implementation, transport (USB/NFC/BLE) and message fragmentation support. Some deployments of CTAP2-based authenticators enforce limits near 1024 bytes for external key communication, and some standardized post-quantum signature schemes increase message sizes and may stress constrained authenticators or transports. As a result CBOR-encoded messages may hit limits in some authenticators. SQIsign-L1, L2 and L5 signatures are small enough to enable delivery over constrained networks like 802.15.4 and may be more suitable for constrained networks due to smaller signature sizes.</t>

<t>This document clarifies that SQIsign does not expose the auxiliary torsion-point information exploited in the SIDH/SIKE attacks. Consequently, the specific attack techniques of Castryck–Decru do not directly apply. However, the scheme remains subject to ongoing cryptanalysis of isogeny-based constructions. By establishing stable COSE and JOSE identifiers, this document ensures the interoperability required for the seamless integration of post-quantum security into high-density, bandwidth-constrained, and legacy-compatible hardware environments.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mott-cose-sqisign/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        COSE Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/antonymott/quantum-resistant-rustykey"/>.</t>
    </note>


  </front>

  <middle>


<?line 104?>

<section anchor="introduction"><name>Introduction</name>

<t>This document registers algorithm identifiers and key type parameters for SQIsign in COSE and JOSE.</t>

<section anchor="background-and-motivation"><name>Background and Motivation</name>

<t>Post-quantum cryptography readiness is critical for constrained devices. As of 2026, while FIDO2/WebAuthn supports various COSE algorithms, some hardware authenticators and platform authenticators (like TPMs) have strict memory/storage constraints, effectively limiting public keys to 1024 bytes or less, hindering the adoption of large-key post-quantum algorithms.</t>

<section anchor="pressing-need-for-smaller-pqc-signatures"><name>Pressing Need for Smaller PQC Signatures</name>

<t>FN-DSA (Falcon) and ML-DSA (Dilithium) have larger signatures that may not fit in constrained environments.</t>

<t>The fundamental differences between ML-DSA, FN-DSA, and SQIsign lie in their underlying hard mathematical problems, implementation complexity, and performance trade-offs.</t>

<t>Falcon (NIST secondary) uses NTRU lattices to achieve very small signatures and fast verification, but requires complex floating-point math. Dilithium (NIST primary) is a balanced, high-efficiency lattice scheme using Module-LWE/SIS, easy to implement.</t>

<t>SQIsign <xref target="SQIsign-Spec"/> <xref target="SQIsign-Analysis"/> is a non-lattice, isogeny-based scheme that offers the smallest signature sizes but suffers from significantly slower signature generation where even vI may take seconds to minutes, or longer with WASM implementations for browsers of particular relevance to signatures required for WebAuthn PassKeys <xref target="WebAuthn-PQC-Signature-size-constraints"/>. SQIsign is an isogeny-based digital signature scheme participating in NIST's Round 2 Additional Digital Signature Schemes, not yet a NIST standard <xref target="NIST-Finalized-Standards"/>.</t>

<t>Speed: SQIsign is significantly slower at signing (roughly 100x to 1000x) compared to ML-DSA, though the math is changing fast and variants improve this.</t>

<t>Table 1 compares representative parameter sets; note that these schemes are at different stages of standardization and evaluation.</t>

<texttable>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Public Key Size</ttcol>
      <ttcol align='left'>Signature Size</ttcol>
      <ttcol align='left'>PK + Sig Fits &lt; 1024?</ttcol>
      <c>ML-DSA-44</c>
      <c>1,312 bytes</c>
      <c>2,420 bytes</c>
      <c>❌</c>
      <c>ML-DSA-65</c>
      <c>1,952 bytes</c>
      <c>3,293 bytes</c>
      <c>❌</c>
      <c>ML-DSA-87</c>
      <c>2,592 bytes</c>
      <c>4,595 bytes</c>
      <c>❌</c>
      <c>FN-DSA-512</c>
      <c>897 bytes</c>
      <c>666 bytes</c>
      <c>❌ (1,563 total)</c>
      <c>FN-DSA-1024</c>
      <c>1,793 bytes</c>
      <c>1,280 bytes</c>
      <c>❌</c>
      <c>SQIsign-L1</c>
      <c>65 bytes</c>
      <c>148 bytes</c>
      <c>✅ (213 total)</c>
      <c>SQIsign-L3</c>
      <c>97 bytes</c>
      <c>224 bytes</c>
      <c>✅ (321 total)</c>
      <c>SQIsign-L5</c>
      <c>129 bytes</c>
      <c>292 bytes</c>
      <c>✅ (421 total)</c>
</texttable>

</section>
<section anchor="estimated-constrained-device-footprint"><name>Estimated Constrained Device Footprint</name>

<t>The total addressable market for SQIsign in constrained devices is estimated at ~6.25 billion units.</t>

<section anchor="device-category-breakdown"><name>Device Category Breakdown</name>

<section anchor="legacy-hardware-security-keys-120-150-million"><name>Legacy Hardware Security Keys: ~120 - 150 million</name>
<t><list style="symbols">
  <t>Security keys in Service: ~120 - 150 million legacy keys in active circulation (Series 5 and older). Some firmware introduced PQC readiness. Some older keys cannot be updated to increase buffer sizes.</t>
</list></t>

</section>
<section anchor="constrained-tpms-and-platform-modules-11-billion"><name>Constrained TPMs and Platform Modules: ~1.1 billion</name>
<t>Trusted Platform Modules (TPMs) are integrated into PCs and servers, but their WebAuthn implementation often inherits protocol-level constraints. Estimated ~2.5 billion active chips worldwide. Constrained Subset: We estimate ~1.1 billion of these are in older Windows 10/11 or Linux machines where the OS "virtual authenticator" or TPM driver still enforces the 1024-byte message default to maintain backward compatibility with external CTAP1/2 tools.</t>

</section>
<section anchor="browser-and-software-implementations-5-billion"><name>Browser and Software Implementations: ~5 billion</name>
<t>This category refers to the "User-Agent" layer that mediates between the web and the hardware.
Global Browser Agents: There are over 5 billion active browser instances across mobile and desktop (Chrome, Safari, Edge, Firefox). Legacy Protocols: Even on modern hardware, browsers often use the FIDO2 CTAP2 specification which, unless explicitly negotiated for larger messages, maintains a 1024-byte default for external key communication.</t>

</section>
<section anchor="critical-infrastructure-300-million-includes-energy-electric-nuclear-oil-gas-water-wastewater-transportation-systems-communications-government-emergency-services-healthcare-and-financial-services"><name>Critical Infrastructure: ~300 Million includes Energy (electric, nuclear, oil, gas), Water &amp; Wastewater, Transportation Systems, Communications, Government, Emergency Services, Healthcare and Financial Services</name>
<t>Industrial/Government: Agencies like the U.S. Department of Defense rely on high-security FIPS-certified keys that are notoriously slow to upgrade. We estimate ~50 million "frozen" government keys. IoT Security: Of the ~21 billion connected IoT devices in 2026, only a fraction use WebAuthn. However, for those that do (smart locks, secure gateways), approximately 250 million are estimated to use older, non-upgradable secure elements limited to 1024-byte payloads. Recent government-level initiatives highlight the necessity to "...effectively deprecate the use of RSA, Diffie-Hellman (DH), and elliptic curve cryptography (ECDH and ECDSA) when mandated." <xref target="CNSA-2"/>, Page 4.</t>

</section>
</section>
</section>
<section anchor="pressing-need-limit-or-stop-harvest-now-decrypt-later-attacks"><name>Pressing need: Limit or Stop 'Harvest now; decrypt later' Attacks</name>
<t>Adversaries are collecting encrypted data today to decrypt when quantum computers become available. The transition to post-quantum cryptography (PQC) is critical for ensuring long-term security of digital communications against adversaries equipped with large-scale quantum computers. The National Institute of Standards and Technology (NIST) has been leading standardization efforts, having selected initial PQC algorithms and continuing to evaluate additional candidates.</t>

<t>CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/> is specifically designed for constrained node networks and IoT environments where bandwidth, storage, and computational resources are limited. The compact nature of SQIsign makes it an ideal candidate for COSE deployments.</t>

</section>
</section>
<section anchor="scope-and-status"><name>Scope and Status</name>

<t>This document is published on the <strong>Standards</strong> track rather than Informational Track for the following reasons:</t>

<t><list style="numbers" type="1">
  <t><strong>Algorithm Maturity</strong>: SQIsign is currently undergoing evaluation in NIST's on-ramp process</t>
  <t><strong>Continued Cryptanalysis</strong>: The algorithm has active ongoing review by the cryptographic research community, including the IRTF CFRG</t>
  <t><strong>High anticipated demand</strong>: This specification enables experimentation and early deployment to gather implementation experience</t>
</list></t>

<t><strong>This document does not represent Working Group consensus on algorithm innovation.</strong> The COSE and JOSE working groups focus on algorithm <em>integration</em> and <em>encoding</em>, not cryptographic algorithm design. The cryptographic properties of SQIsign are being evaluated through NIST's process and academic peer review.</t>

</section>
<section anchor="relationship-to-other-work"><name>Relationship to Other Work</name>

<t>This document follows the precedent established by <xref target="I-D.ietf-cose-falcon"/> and <xref target="I-D.ietf-cose-dilithium"/> for integrating NIST PQC candidate algorithms into COSE and JOSE. The structure and approach are intentionally aligned to provide consistency across post-quantum signature scheme integrations.</t>

</section>
<section anchor="constrained-device-applicability"><name>Constrained Device Applicability</name>
<t>SQIsign is particularly attractive for:</t>

<t><list style="symbols">
  <t><strong>IoT sensors</strong> with limited flash memory</t>
  <t><strong>Firmware updates</strong> over low-bandwidth networks (LoRaWAN, NB-IoT)</t>
  <t><strong>Embedded certificates</strong> in constrained devices</t>
  <t><strong>Blockchain and DLT</strong> where transaction size affects fees</t>
  <t><strong>Satellite communications</strong> with bandwidth constraints</t>
</list></t>

</section>
</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>This document uses the following terms:</t>

<t><list style="symbols">
  <t><strong>PQC</strong>: Post-Quantum Cryptography</t>
  <t><strong>COSE</strong>: CBOR Object Signing and Encryption</t>
  <t><strong>JOSE</strong>: JSON Object Signing and Encryption</t>
  <t><strong>JWS</strong>: JSON Web Signature</t>
  <t><strong>JWK</strong>: JSON Web Key</t>
  <t><strong>CBOR</strong>: Concise Binary Object Representation <xref target="RFC7049"/></t>
  <t><strong>ECDH</strong>: Elliptic Curve Diffie-Hellman</t>
  <t><strong>IANA</strong>: Internet Assigned Numbers Authority</t>
</list></t>

</section>
<section anchor="resistance-to-torsion-point-attack"><name>Resistance to "Torsion Point" attack</name>

<section anchor="sike-vulnerability-the-torsion-point-attack-of-2022"><name>SIKE Vulnerability (The "Torsion Point" Attack) of 2022</name>

<t>SIKE (Supersingular Isogeny Key Encapsulation) was a key exchange, more specifically, a Key Encapsulation Mechanism (KEM). In the SIKE protocol, users had to share more than just the target elliptic curve. To make the math work for key exchange, they shared the images of specific points (called torsion points) under the secret isogeny.</t>

<t><list style="symbols">
  <t>The Info: If the secret isogeny is 𝜙, SIKE gave away 𝜙(𝑃) and 𝜙(𝑄) for specific basis points 𝑃 and 𝑄.</t>
  <t>The Break: In 2022, Castryck and Decru showed that this auxiliary information allowed an attacker to allowed an attacker to construct a higher-dimensional abelian variety linking the public data. In this setting, the secret isogeny can be recovered efficiently using techniques based on Kani’s results on isogenies between products of elliptic curves.</t>
  <t>The Oversight: For years, cryptanalysts thought this extra info was harmless. Related techniques existed in the algebraic geometry literature but had not previously been applied in this cryptographic context.</t>
</list></t>

</section>
<section anchor="why-sqisign-appears-unaffected-by-the-sike-vulnerability"><name>Why SQISign appears unaffected by the SIKE Vulnerability</name>

<t>SQIsign is a signature scheme in which the prover demonstrates knowledge of an isogeny through a zero-knowledge protocol. Unlike SIDH/SIKE, it does not publish images of torsion basis points under secret isogenies.
The Castryck–Decru attack relies critically on this auxiliary torsion-point information to construct additional structure (e.g., via abelian surfaces) that enables efficient recovery of the secret isogeny.
Because SQIsign does not provide such auxiliary data, these techniques do not directly apply. Attacks would instead need to solve instances of the isogeny path problem or related problems in the endomorphism ring, for which no comparable shortcut is currently known.</t>

</section>
</section>
<section anchor="sqisign-algorithm-overview"><name>SQIsign Algorithm Overview</name>

<section anchor="cryptographic-foundation"><name>Cryptographic Foundation</name>

<t>SQIsign is based on the hardness of finding isogenies between supersingular elliptic curves over finite fields. The security assumption relies primarily on the difficulty of the <strong>Isogeny Path Problem</strong></t>

<t>Unlike lattice-based schemes, isogeny-based cryptography offers:</t>

<t><list style="symbols">
  <t><strong>Smaller key and signature sizes</strong></t>
  <t><strong>Algebraic structure</strong> based on elliptic curve isogenies</t>
  <t><strong>Different security assumptions</strong> (diversification from lattice-based schemes)</t>
</list></t>

</section>
<section anchor="security-levels"><name>Security Levels</name>

<t>SQIsign is defined with three parameter sets corresponding to NIST security levels:</t>

<texttable>
      <ttcol align='left'>Parameter Set</ttcol>
      <ttcol align='left'>NIST Level</ttcol>
      <ttcol align='left'>Public Key</ttcol>
      <ttcol align='left'>Signature</ttcol>
      <ttcol align='left'>Classical Sec</ttcol>
      <c>SQIsign-L1</c>
      <c>I</c>
      <c>65 bytes</c>
      <c>148 bytes</c>
      <c>~128 bits</c>
      <c>SQIsign-L3</c>
      <c>III</c>
      <c>97 bytes</c>
      <c>224 bytes</c>
      <c>~192 bits</c>
      <c>SQIsign-L5</c>
      <c>V</c>
      <c>129 bytes</c>
      <c>292 bytes</c>
      <c>~256 bits</c>
</texttable>

</section>
<section anchor="performance-characteristics"><name>Performance Characteristics</name>

<t><list style="symbols">
  <t><strong>Signing</strong>: Computationally intensive (slower than lattice schemes)</t>
  <t><strong>Verification</strong>: Moderate computational cost</t>
  <t><strong>Key Generation</strong>: Intensive computation required</t>
  <t><strong>Size</strong>: Exceptional efficiency: substantially smaller than many lattice-based alternatives at comparable security levels</t>
</list></t>

<t><strong>Recommended Use Cases:</strong>
- Sign-once, verify-many scenarios (firmware, certificates)
- Bandwidth-constrained environments
- Storage-limited devices
- Applications where signature/key size dominates performance considerations</t>

</section>
</section>
<section anchor="cose-integration"><name>COSE Integration</name>

<t>This section defines the identifiers for SQIsign in COSE <xref target="RFC8152"/>.</t>

<section anchor="sqisign-algorithms"><name>SQIsign Algorithms</name>

<t>The algorithms defined in this document are:</t>

<t><list style="symbols">
  <t>SQIsign-L1: SQIsign NIST Level I (suggested value -61)</t>
  <t>SQIsign-L3: SQIsign NIST Level III (suggested value -62)</t>
  <t>SQIsign-L5: SQIsign NIST Level V (suggested value -63)</t>
</list></t>

</section>
<section anchor="sqisign-key-types"><name>SQIsign Key Types</name>

<t>A new key type is defined for SQIsign with the name "SQIsign".</t>

</section>
<section anchor="sqisign-key-parameters"><name>SQIsign Key Parameters</name>

<t>SQIsign keys use the following COSE Key common parameters:</t>

<texttable>
      <ttcol align='left'>Key Parameter</ttcol>
      <ttcol align='left'>COSE Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>kty</c>
      <c>1</c>
      <c>int</c>
      <c>Key type: IETF (SQIsign)</c>
      <c>kid</c>
      <c>2</c>
      <c>bstr</c>
      <c>Key ID (optional)</c>
      <c>alg</c>
      <c>3</c>
      <c>int</c>
      <c>Algorithm identifier (-61, -62, or -63)</c>
      <c>key_ops</c>
      <c>4</c>
      <c>array</c>
      <c>Key operations (<spanx style="verb">sign</spanx>, <spanx style="verb">verify</spanx>)</c>
</texttable>

</section>
<section anchor="sqisign-specific-key-parameters"><name>SQIsign-Specific Key Parameters</name>

<texttable>
      <ttcol align='left'>Key Parameter</ttcol>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>pub</c>
      <c>-1</c>
      <c>bstr</c>
      <c>SQIsign public key</c>
      <c>priv</c>
      <c>-2</c>
      <c>bstr</c>
      <c>SQIsign private key (sensitive)</c>
</texttable>

</section>
<section anchor="cose-key-format-examples"><name>COSE Key Format Examples</name>

<section anchor="public-key-cosekey"><name>Public Key (COSE_Key)</name>

<t><spanx style="verb">cbor
{
  1: IETF,              / kty: SQIsign /
  3: -61,              / alg: SQIsign-L1 /
  -1: h'[PUBLIC_KEY]'  / pub: SQIsign public key bytes /
}
</spanx></t>

</section>
<section anchor="private-key-cosekey"><name>Private Key (COSE_Key)</name>

<t><spanx style="verb">cbor
{
  1: IETF,               / kty: SQIsign /
  3: -61,               / alg: SQIsign-L1 /
  -1: h'[PUBLIC_KEY]',  / pub: SQIsign public key bytes /
  -2: h'[PRIVATE_KEY]'  / priv: SQIsign private key bytes /
}
</spanx></t>

</section>
</section>
<section anchor="cose-signature-format"><name>COSE Signature Format</name>

<t>SQIsign signatures in COSE follow the standard COSE_Sign1 structure <xref target="RFC9052"/>:</t>

<t><spanx style="verb">
COSE_Sign1 = [
    protected: bstr .cbor header_map,
    unprotected: header_map,
    payload: bstr / nil,
    signature: bstr
]
</spanx></t>

<t>The <spanx style="verb">signature</spanx> field contains the raw SQIsign signature bytes.</t>

<section anchor="protected-headers"><name>Protected Headers</name>

<t>The protected header <bcp14>MUST</bcp14> include:</t>

<t><spanx style="verb">cbor
{
  1: -61  / alg: SQIsign-L1, -62 for L3, -63 for L5 /
}
</spanx></t>

</section>
<section anchor="example-cosesign1-structure"><name>Example COSE_Sign1 Structure</name>

<t><spanx style="verb">cbor
18(                                  / COSE_Sign1 tag /
  [
    h'A10139003C',                   / protected: {"alg": -61} /
    {},                              / unprotected /
    h'546869732069732074686520636F6E74656E742E', / payload /
    h'[SQISIGN_SIGNATURE_BYTES]'     / signature /
  ]
)
</spanx></t>

</section>
</section>
</section>
<section anchor="jose-integration"><name>JOSE Integration</name>

<section anchor="json-web-signature-jws-algorithm-registration"><name>JSON Web Signature (JWS) Algorithm Registration</name>

<t>The following algorithm identifiers are registered for use in the JWS "alg" header parameter for JSON Web Signatures <xref target="RFC7515"/>:</t>

<texttable>
      <ttcol align='left'>Algorithm Name</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Implementation Requirements</ttcol>
      <c>SQIsign-L1</c>
      <c>SQIsign NIST Level I</c>
      <c>Optional</c>
      <c>SQIsign-L3</c>
      <c>SQIsign NIST Level III</c>
      <c>Optional</c>
      <c>SQIsign-L5</c>
      <c>SQIsign NIST Level V</c>
      <c>Optional</c>
</texttable>

</section>
<section anchor="json-web-key-jwk-representation"><name>JSON Web Key (JWK) Representation</name>

<t>SQIsign keys are represented in JWK <xref target="RFC7517"/> format as follows:</t>

<section anchor="public-key-parameters"><name>Public Key Parameters</name>

<texttable>
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>kty</c>
      <c>string</c>
      <c>Key type: "SQIsign"</c>
      <c>alg</c>
      <c>string</c>
      <c>Algorithm: "SQIsign-L1", "SQIsign-L3", or "SQIsign-L5"</c>
      <c>pub</c>
      <c>string</c>
      <c>Base64url-encoded public key</c>
      <c>kid</c>
      <c>string</c>
      <c>Key ID (optional)</c>
      <c>use</c>
      <c>string</c>
      <c>Public key use: "sig" (optional)</c>
      <c>key_ops</c>
      <c>array</c>
      <c>Key operations: [verify] (optional)</c>
</texttable>

</section>
<section anchor="private-key-parameters"><name>Private Key Parameters</name>

<t>Private keys include all public key parameters plus:</t>

<texttable>
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>priv</c>
      <c>string</c>
      <c>Base64url-encoded private key</c>
</texttable>

</section>
</section>
<section anchor="jwk-examples"><name>JWK Examples</name>

<section anchor="public-key-jwk-example"><name>Public Key (JWK) Example</name>

<t><spanx style="verb">json
{
  "kty": "SQIsign",
  "alg": "SQIsign-L1",
  "pub": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_\
    5xZuqgMwkaeJhM94YHi_-2UsQllbnmm-W4XFSLm2hUwiMylrAh0",
  "kid": "2027-01-device-key",
  "use": "sig",
  "key_ops": ["verify"]
}
</spanx></t>

</section>
<section anchor="private-key-jwk-example"><name>Private Key (JWK) Example</name>

<t><spanx style="verb">json
{
  "kty": "SQIsign",
  "alg": "SQIsign-L1",
  "pub": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_\
    5xZuqgMwkaeJhM94YHi_-2UsQllbnmm-W4XFSLm2hUwiMylrAh0",
  "priv": "KxtQx8s8RcBEU67wr57K37fdPEztN4M8NUC_5xZuqgMwkaeJhM94YHi_\
    -2UsQllbnmm-W4XFSLm2hUwiMylrAh1VwP9vNkBZH0Bjj2wc-\
    p7sUgQAAAAAAAAAAAAAAAAAAN68tviJbcCpQ84fh-4IJB4-\
    ____________________P38m3fKOhfhMspQU9GmA4CD5___\
    _______________________________________________\
    ___________wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\
    AAAAAAA5cP9aha40v-8mFd_bdAgpR93Ug2iPhu4_NxG97C7\
    8wBvVMGOrQTCli7NxrR2KlPZR1AC5VddGf4p-ZjCzrWfAJv\
    xhEh4uOKXq1MmuS9TwZGuz1YIYMIguu1wqjdmfaQAfOmK2g\
    WWO3vcld5s7GR2AcrTv65ocK_pVUWY8eJDcQA",
  "kid": "2027-01-device-key",
  "use": "sig",
  "key_ops": ["sign"]
}
</spanx></t>

</section>
</section>
<section anchor="jws-compact-serialization"><name>JWS Compact Serialization</name>

<t>A JWS using SQIsign follows the standard compact serialization:</t>

<t><spanx style="verb">
BASE64URL(UTF8(JWS Protected Header)) || '.' ||
BASE64URL(JWS Payload) || '.' ||
BASE64URL(JWS Signature)
</spanx></t>

<section anchor="example-jws-protected-header"><name>Example JWS Protected Header</name>

<t><spanx style="verb">json
{
  "alg": "SQIsign-L1",
  "typ": "JWT"
}
</spanx></t>

<t>Base64url-encoded: <spanx style="verb">eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0</spanx></t>

</section>
<section anchor="complete-jws-example"><name>Complete JWS Example</name>

<t><spanx style="verb">
eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0
.
[BASE64URL_PAYLOAD]
.
[BASE64URL_SQISIGN_SIGNATURE]
</spanx></t>

</section>
</section>
</section>
<section anchor="implementation-considerations"><name>Implementation Considerations</name>

<section anchor="signature-and-key-generation"><name>Signature and Key Generation</name>

<t>Implementations <bcp14>MUST</bcp14> follow the SQIsign specification <xref target="SQIsign-Spec"/> for:</t>

<t><list style="symbols">
  <t>Key pair generation</t>
  <t>Signature generation</t>
  <t>Signature verification</t>
</list></t>

</section>
<section anchor="randomness-requirements"><name>Randomness Requirements</name>

<t>SQIsign signature generation requires high-quality randomness. Implementations <bcp14>MUST</bcp14> use a cryptographically secure random number generator (CSRNG) compliant with <xref target="RFC4086"/> or equivalent.</t>

</section>
<section anchor="side-channel-protections"><name>Side-Channel Protections</name>

<t>Implementations <bcp14>SHOULD</bcp14> implement protections against:</t>

<t><list style="symbols">
  <t>Timing attacks</t>
  <t>Power analysis</t>
  <t>Fault injection attacks</t>
</list></t>

<t>Particularly for constrained devices deployed in physically accessible environments.</t>

</section>
<section anchor="performance-trade-offs"><name>Performance Trade-offs</name>

<t>Implementers should be aware:</t>

<t><list style="symbols">
  <t><strong>Signing is computationally expensive</strong>: Consider pre-signing or batch operations</t>
  <t><strong>Verification is moderate</strong>: Suitable for resource-constrained verifiers</t>
  <t><strong>Size is exceptional</strong>: Minimizes bandwidth and storage</t>
</list></t>

</section>
<section anchor="interoperability-testing"><name>Interoperability Testing</name>

<t>Early implementations <bcp14>SHOULD</bcp14> participate in interoperability testing to ensure:</t>

<t><list style="symbols">
  <t>Consistent signature generation and verification</t>
  <t>Proper encoding in COSE and JOSE formats</t>
  <t>Cross-platform compatibility</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="algorithm-security"><name>Algorithm Security</name>

<t>The security of SQIsign relies primarily on the hardness of finding isogenies between supersingular elliptic curves.</t>

<t>These assumptions are <strong>different from lattice-based schemes</strong>, providing cryptographic diversity in the post-quantum landscape.</t>

</section>
<section anchor="quantum-security"><name>Quantum Security</name>

<t>SQIsign is designed to resist attacks by large-scale quantum computers. The three parameter sets provide security equivalent to AES-128, AES-192, and AES-256 against both classical and quantum adversaries.</t>

</section>
<section anchor="current-cryptanalysis-status"><name>Current Cryptanalysis Status</name>

<t>As of this writing, SQIsign is undergoing active cryptanalytic review:</t>

<t><list style="symbols">
  <t><strong>NIST Round 2 evaluation</strong>: <xref target="NIST-Finalized-Standards"/></t>
  <t><strong>Academic research</strong>: Ongoing analysis of isogeny-based cryptography</t>
  <t><strong>Known attacks</strong>: No attacks are currently known that recover private keys for the standardized parameter sets within their claimed security levels. However, the scheme and its underlying assumptions remain under active study.</t>
</list></t>

<t><strong>Implementers are advised</strong>:
- Monitor NIST announcements and updates
- Follow academic literature on isogeny cryptanalysis
- Be prepared to deprecate or update as cryptanalysis evolves</t>

</section>
<section anchor="implementation-security"><name>Implementation Security</name>

<section anchor="random-number-generation"><name>Random Number Generation</name>

<t>Poor randomness can completely compromise SQIsign security. Implementations <bcp14>MUST</bcp14> use robust CSRNGs, especially on constrained devices with limited entropy sources.</t>

</section>
<section anchor="side-channel-resistance"><name>Side-Channel Resistance</name>

<t>Constrained devices may be physically accessible to attackers. Implementations <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Use constant-time algorithms where possible</t>
  <t>Implement countermeasures against DPA/SPA</t>
  <t>Consider fault attack mitigations</t>
</list></t>

</section>
<section anchor="key-management"><name>Key Management</name>

<t><list style="symbols">
  <t>Private keys <bcp14>MUST</bcp14> be protected with appropriate access controls</t>
  <t>Consider hardware security modules (HSMs) or secure elements for key storage</t>
  <t>Implement key rotation policies appropriate to the deployment</t>
</list></t>

</section>
</section>
<section anchor="cryptographic-agility"><name>Cryptographic Agility</name>

<t>Organizations deploying SQIsign <bcp14>SHOULD</bcp14>:</t>

<t><list style="symbols">
  <t>Maintain hybrid deployments with classical algorithms during transition</t>
  <t>Plan for algorithm migration if cryptanalysis reveals weaknesses</t>
  <t>Monitor NIST and IRTF guidance on PQC deployment</t>
</list></t>

</section>
<section anchor="constrained-device-specific-risks"><name>Constrained Device Specific Risks</name>

<t>IoT devices face unique challenges:</t>

<t><list style="symbols">
  <t><strong>Physical access</strong>: Devices may be deployed in hostile environments</t>
  <t><strong>Limited update capability</strong>: Firmware updates may be infrequent or impossible</t>
  <t><strong>Long deployment lifetimes</strong>: Devices may operate for 10+ years</t>
</list></t>

<t>Design systems with:
- Defense in depth (multiple security layers)
- Remote update capability when possible
- Graceful degradation if algorithm is compromised</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<t>IANA is requested to add the following entries to the COSE and JOSE registries. The following completed registration actions are provided as described in <xref target="RFC9053"/> and <xref target="RFC9054"/>.</t>

<section anchor="new-cose-algorithms"><name>New COSE Algorithms</name>

<t>IANA is requested to register the following entries in the "COSE Algorithms" registry:</t>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Capabilities</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <ttcol align='left'>Rec'd</ttcol>
      <c>SQIsign-L1</c>
      <c>-61</c>
      <c>SQIsign NIST L I</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L3</c>
      <c>-62</c>
      <c>SQIsign NIST L III</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L5</c>
      <c>-63</c>
      <c>SQIsign NIST L V</c>
      <c>kty</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
</texttable>

</section>
<section anchor="new-cose-key-types"><name>New COSE Key Types</name>

<t>IANA is requested to register the following entry in the "COSE Key Types" registry:</t>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Capabilities</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>SQIsign pub key</c>
      <c>sign, verify</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-cose-key-type-parameters"><name>New COSE Key Type Parameters</name>

<t>IANA is requested to register the following entries in the "COSE Key Type Parameters" registry:</t>

<texttable>
      <ttcol align='left'>Key Type</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Label</ttcol>
      <ttcol align='left'>CBOR Type</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SQIsign</c>
      <c>pub</c>
      <c>-1</c>
      <c>bstr</c>
      <c>Public key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>SQIsign</c>
      <c>priv</c>
      <c>-2</c>
      <c>bstr</c>
      <c>Private key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-jws-algorithms"><name>New JWS Algorithms</name>

<t>IANA is requested to register the following entries in the "JSON Web Signature and Encryption Algorithms" registry:</t>

<texttable>
      <ttcol align='left'>Algorithm Name</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Impl Req</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Ref</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <c>SQIsign-L1</c>
      <c>SQIsign NIST L I</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L3</c>
      <c>SQIsign NIST L III</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
      <c>SQIsign-L5</c>
      <c>SQIsign NIST L V</c>
      <c>Optional</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>No</c>
</texttable>

</section>
<section anchor="new-json-web-key-types"><name>New JSON Web Key Types</name>

<t>IANA is requested to register the following entry in the "JSON Web Key Types" registry:</t>

<texttable>
      <ttcol align='left'>"kty" Param Value</ttcol>
      <ttcol align='left'>Key Type Desc</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SQIsign</c>
      <c>SQIsign public key</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
<section anchor="new-json-web-key-parameters"><name>New JSON Web Key Parameters</name>

<t>IANA is requested to register the following entries in the "JSON Web Key Parameters" registry:</t>

<texttable>
      <ttcol align='left'>Param Name</ttcol>
      <ttcol align='left'>Desc</ttcol>
      <ttcol align='left'>Used with "kty" Val</ttcol>
      <ttcol align='left'>Change Cont</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>pub</c>
      <c>Public key</c>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
      <c>priv</c>
      <c>Private key</c>
      <c>SQIsign</c>
      <c>IETF</c>
      <c>THIS-RFC</c>
</texttable>

</section>
</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank:</t>

<t><list style="symbols">
  <t>Luca DeFeo for reviewing draft-00 and providing valuable feedback. Any remaining errors are solely the responsibility of the authors.</t>
  <t>The SQIsign design team for groundbreaking work on isogeny-based signatures</t>
  <t>The NIST PQC team for managing the standardization process</t>
  <t>The COSE and JOSE working groups for guidance on integration</t>
  <t>The IRTF Crypto Forum Research Group for ongoing cryptanalytic review</t>
  <t>Early implementers who provide valuable feedback</t>
</list></t>

<t>This work builds upon the template established by <xref target="I-D.ietf-cose-falcon"/> and similar PQC integration efforts.</t>

</section>
<section anchor="references"><name>References</name>

<section anchor="normative-references"><name>Normative References</name>

<t><em>Populated automatically from metadata</em></t>

</section>
<section anchor="informative-references"><name>Informative References</name>

<t><em>Populated automatically from metadata</em></t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC7515">
  <front>
    <title>JSON Web Signature (JWS)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7515"/>
  <seriesInfo name="DOI" value="10.17487/RFC7515"/>
</reference>
<reference anchor="RFC7517">
  <front>
    <title>JSON Web Key (JWK)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7517"/>
  <seriesInfo name="DOI" value="10.17487/RFC7517"/>
</reference>
<reference anchor="RFC8152">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8152"/>
  <seriesInfo name="DOI" value="10.17487/RFC8152"/>
</reference>
<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>
<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>
<reference anchor="RFC9054">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9054"/>
  <seriesInfo name="DOI" value="10.17487/RFC9054"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4086">
  <front>
    <title>Randomness Requirements for Security</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="J. Schiller" initials="J." surname="Schiller"/>
    <author fullname="S. Crocker" initials="S." surname="Crocker"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
      <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="106"/>
  <seriesInfo name="RFC" value="4086"/>
  <seriesInfo name="DOI" value="10.17487/RFC4086"/>
</reference>
<reference anchor="RFC7049">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7049"/>
  <seriesInfo name="DOI" value="10.17487/RFC7049"/>
</reference>

<reference anchor="I-D.ietf-cose-falcon">
   <front>
      <title>FN-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>mesur.io</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Tradeverifyd</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>University of the Bundeswehr Munich</organization>
      </author>
      <date day="15" month="March" year="2026"/>
      <abstract>
	 <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for FFT
   (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature
   Algorithm (FN-DSA), a Post-Quantum Cryptography (PQC) digital
   signature scheme defined in US NIST FIPS 206 (expected to be
   published in late 2026 early 2027).

   It does not define new cryptographic primitives; rather, it specifies
   how existing FN-DSA mechanisms are serialized for use in JOSE and
   COSE.  This document registers signature algorithms for JOSE and
   COSE, specifically FN-DSA-512 and FN-DSA-1024.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-falcon-04"/>
   
</reference>

<reference anchor="I-D.ietf-cose-dilithium">
   <front>
      <title>ML-DSA for JOSE and COSE</title>
      <author fullname="Michael Prorock" initials="M." surname="Prorock">
         <organization>Tradeverifyd</organization>
      </author>
      <author fullname="Orie Steele" initials="O." surname="Steele">
         <organization>Tradeverifyd</organization>
      </author>
      <date day="15" month="November" year="2025"/>
      <abstract>
	 <t>   This document specifies JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for Module-
   Lattice-Based Digital Signature Standard (ML-DSA), a Post-Quantum
   Cryptography (PQC) digital signature scheme defined in US NIST FIPS
   204.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
   
</reference>

<reference anchor="SQIsign-Spec" target="https://sqisign.org/spec/sqisign-20250205.pdf">
  <front>
    <title>SQIsign: Compact Post-Quantum Signatures from Quaternions and Isogenies (Round 2)</title>
    <author initials="" surname="SQIsign team">
      <organization></organization>
    </author>
    <date year="2025" month="February"/>
  </front>
</reference>
<reference anchor="NIST-Finalized-Standards" target="https://www.nist.gov/news-events/news/2024/08/
nist-releases-first-3-finalized-post-quantum-encryption-standards
">
  <front>
    <title>"NIST Releases First 3 Finalized
Post-Quantum Encryption Standards"</title>
    <author >
      <organization>NIST</organization>
    </author>
    <date year="2024" month="August"/>
  </front>
</reference>
<reference anchor="SQIsign-Analysis" target="https://eprint.iacr.org/2020/1240">
  <front>
    <title>"SQIsign: Compact Post-Quantum Signatures
from Quaternions and Isogenies"</title>
    <author >
      <organization>IACR ePrint Archive</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="CNSA-2" target="https://media.defense.gov/2025/May/30/
2003728741/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS.PDF
">
  <front>
    <title>Commercial National Security Algorithm Suite 2.0</title>
    <author >
      <organization>National Security Agency</organization>
    </author>
    <date year="2025" month="May"/>
  </front>
</reference>
<reference anchor="WebAuthn-PQC-Signature-size-constraints" target="https://www.npmjs.com/package/quantum-resistant-rustykey">
  <front>
    <title>WebAuthn PQC Signature size constraints</title>
    <author >
      <organization>University of Quantum Science</organization>
    </author>
    <date year="2026" month="April"/>
  </front>
</reference>


    </references>

</references>


<?line 667?>

<section anchor="test-vectors"><name>Test Vectors</name>

<section anchor="sqisign-l1-test-vectors"><name>SQIsign-L1 Test Vectors</name>

<section anchor="example-1-simple-message-signing"><name>Example 1: Simple Message Signing</name>

<t>The following test vector exhibits a SQIsign Level I signature over a short message.</t>

<t>Message (hex): <spanx style="verb">d81c4d8d734fcbfbeade3d3f8a039faa2a2c9957e835ad55b2 \
2e75bf57bb556ac8</spanx>
Message (ASCII): <spanx style="verb">MsO=?*,W5U.uWUj</spanx></t>

<t>Public Key (hex): <spanx style="verb">07CCD21425136F6E865E497D2D4D208F0054AD81372066E \
817480787AAF7B2029550C89E892D618CE3230F23510BFBE68FCCDDAEA51DB1436 \
B462ADFAF008A010B</spanx>
Public Key (Base64url): <spanx style="verb">B8zSFCUTb26GXkl9LU0gjwBUrYE3IGboF0gHh6r3s \
gKVUMieiS1hjOMjDyNRC_vmj8zdrqUdsUNrRirfrwCKAQs</spanx></t>

<t>Signature (hex): <spanx style="verb">84228651f271b0f39f2f19f2e8718f31ed3365ac9e5cb303 \
afe663d0cfc11f0455d891b0ca6c7e653f9ba2667730bb77befe1b1a3182840428 \
4af8fd7baacc010001d974b5ca671ff65708d8b462a5a84a1443ee9b5fed721876 \
7c9d85ceed04db0a69a2f6ec3be835b3b2624b9a0df68837ad00bcacc27d1ec806 \
a44840267471d86eff3447018adb0a6551ee8322ab30010202</spanx>
Signature (Base64url): <spanx style="verb">hCKGUfJxsPOfLxny6HGPMe0zZayeXLMDr-Zj0M_BHw \
RV2JGwymx-ZT-bomZ3MLt3vv4bGjGChAQoSvj9e6rMAQAB2XS1ymcf9lcI2LRipahK \
FEPum1_tchh2fJ2Fzu0E2wppovbsO-g1s7JiS5oN9og3rQC8rMJ9HsgGpEhAJnRx2G \
7_NEcBitsKZVHugyKrMAECAg</spanx></t>

</section>
<section anchor="cosesign1-complete-example"><name>COSE_Sign1 Complete Example</name>

<t><spanx style="verb">cbor
18(
  [
    h'a10139003c', / protected: {"alg": -61} /
    {},           / unprotected /
    h'd81c4d8d734fcbfbeade3d3f8a039faa2a2c9957e835ad55b22e75bf57bb \
    556ac8', / payload /
    h'84228651f271b0f39f2f19f2e8718f31ed3365ac9e5cb303afe663d0cfc1 \
    1f0455d891b0ca6c7e653f9ba2667730bb77befe1b1a31828404284af8fd7b \
    aacc010001d974b5ca671ff65708d8b462a5a84a1443ee9b5fed7218767c9d \
    85ceed04db0a69a2f6ec3be835b3b2624b9a0df68837ad00bcacc27d1ec806 \
    a44840267471d86eff3447018adb0a6551ee8322ab30010202'
  ]
)
</spanx></t>

</section>
<section anchor="jws-complete-example"><name>JWS Complete Example</name>

<t><spanx style="verb">
eyJhbGciOiJTUUlzaWduLUwxIiwidHlwIjoiSldUIn0
.
2BxNjXNPy_vq3j0_igOfqiosmVfoNa1Vsi51v1e7VWrI
.
hCKGUfJxsPOfLxny6HGPMe0zZayeXLMDr-Zj0M_BHwRV2JGwymx-ZT-bomZ3MLt3vv \
4bGjGChAQoSvj9e6rMAQAB2XS1ymcf9lcI2LRipahKFEPum1_tchh2fJ2Fzu0E2wpp \
ovbsO-g1s7JiS5oN9og3rQC8rMJ9HsgGpEhAJnRx2G7_NEcBitsKZVHugyKrMAECAg
</spanx></t>

</section>
</section>
<section anchor="sqisign-l3-test-vectors"><name>SQIsign-L3 Test Vectors</name>

<t><spanx style="verb">
[PLACEHOLDER FOR L3 TEST VECTORS]
</spanx></t>

</section>
<section anchor="sqisign-l5-test-vectors"><name>SQIsign-L5 Test Vectors</name>

<t><spanx style="verb">
[PLACEHOLDER FOR L5 TEST VECTORS]
</spanx></t>

</section>
</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>[RFC Editor: Please remove this section before publication]</t>

<t>This section records the status of known implementations at the time of writing.</t>

<section anchor="open-source-implementations"><name>Open Source Implementations</name>

<section anchor="reference-implementation"><name>Reference Implementation</name>

<t><list style="symbols">
  <t><strong>Organization</strong>: SQIsign team</t>
  <t><strong>Repository</strong>: https://github.com/SQISign/the-sqisign</t>
  <t><strong>Language</strong>: C</t>
  <t><strong>License</strong>: MIT</t>
  <t><strong>Status</strong>: Active development</t>
  <t><strong>COSE/JOSE Support</strong>: Not yet integrated</t>
</list></t>

</section>
<section anchor="rust-implementation"><name>Rust Implementation</name>

<t><list style="symbols">
  <t><strong>Organization</strong>: IETF - Community implementation</t>
  <t><strong>Repository</strong>: IETF</t>
  <t><strong>Language</strong>: Rust</t>
  <t><strong>License</strong>: IETF</t>
  <t><strong>COSE Support</strong>: Planned</t>
  <t><strong>Status</strong>: Development</t>
</list></t>

</section>
</section>
<section anchor="commercial-implementations"><name>Commercial Implementations</name>

<t>[RFC EDITOR: To be populated as vendors implement]</t>

</section>
<section anchor="interoperability-testing-1"><name>Interoperability Testing</name>

<t><list style="symbols">
  <t><strong>Test Suite Location</strong>: IETF</t>
  <t><strong>Participating Organizations</strong>: IETF</t>
</list></t>

</section>
</section>
<section anchor="design-rationale"><name>Design Rationale</name>

<section anchor="algorithm-identifier-selection"><name>Algorithm Identifier Selection</name>

<t>The requested algorithm identifiers (-61, -62, -63) are:</t>

<t><list style="symbols">
  <t>In the range designated for experimental/informational use</t>
  <t>Sequential for the three parameter sets</t>
  <t>Not conflicting with existing registrations</t>
  <t>Consistent with the approach used for other PQC algorithms</t>
</list></t>

</section>
<section anchor="key-type-design"><name>Key Type Design</name>

<t>The SQIsign key type is intentionally simple:</t>

<t><list style="symbols">
  <t>Only two parameters (pub, priv) following minimalist design</t>
  <t>Binary encoding (bstr) for efficiency</t>
  <t>No algorithm-specific encoding—raw bytes from SQIsign spec</t>
</list></t>

<t>This approach:
- Minimizes CBOR encoding overhead (critical for constrained devices)
- Simplifies implementation
- Provides future flexibility for parameter set evolution</t>

</section>
</section>
<section anchor="change-log"><name>Change Log</name>

<t>[RFC Editor Note:** Please remove this section before publication]</t>

<section anchor="draft-mott-cose-sqisign-02"><name>draft-mott-cose-sqisign-02</name>

<t><list style="symbols">
  <t>Incorporated technical corrections and feedback from Luca De Feo on draft-00</t>
  <t>Updated the Abstract and Introduction to utilize more neutral, objective language</t>
  <t>Removed vendor-specific branding in favor of generic cryptographic terminology</t>
  <t>fixed various formatting issues</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

