Authors,

While reviewing this document during AUTH48, please resolve (as necessary) 
the following questions, which are also in the source file.

1) <!-- [rfced] The AlgorithmIdentifier type defined in [RFC5912] includes 
an "&" character before "Params".  Please review and let us know if the 
ampersand should be included in the first block of sourcecode.  

In addition, the first line extends 3 characters beyond the margin.  Please 
let us know how the line can be broken.  

Current:
    AlgorithmIdentifier{ALGORITHM-TYPE, ALGORITHM-TYPE:AlgorithmSet} ::=
      SEQUENCE {
        algorithm   ALGORITHM-TYPE.id({AlgorithmSet}),
        parameters  ALGORITHM-TYPE.
                      Params({AlgorithmSet}{@algorithm}) OPTIONAL
     }

>From [RFC5912]:
    AlgorithmIdentifier{ALGORITHM-TYPE, ALGORITHM-TYPE:AlgorithmSet} ::=
        SEQUENCE {
            algorithm   ALGORITHM-TYPE.&id({AlgorithmSet}),
            parameters  ALGORITHM-TYPE.
                   &Params({AlgorithmSet}{@algorithm}) OPTIONAL
        }
-->


2) <!-- [rfced] The following sentences makes it seem like this ASN.1 is 
copied from [RFC5280], but this exact source code doesn't appear to be in
[RFC5280]. Perhaps the intent is to indicate the use "1988 ASN.1 syntax"? 

Current:

   As shown in the ASN.1 representation from [RFC5280] below, in an X.509
   certificate, a signature is encoded with an algorithm identifier in
   the signatureAlgorithm attribute and a signatureValue attribute that
   contains the actual signature.

    Certificate  ::=  SIGNED{ TBSCertificate }

    SIGNED{ToBeSigned} ::= SEQUENCE {
     toBeSigned           ToBeSigned,
     algorithmIdentifier  SEQUENCE {
         algorithm        SIGNATURE-ALGORITHM.
                            &id({SignatureAlgorithms}),
         parameters       SIGNATURE-ALGORITHM.
                            &Params({SignatureAlgorithms}
                              {@algorithmIdentifier.algorithm})
                                OPTIONAL
     },
     signature BIT STRING (CONTAINING SIGNATURE-ALGORITHM.&Value(
                              {SignatureAlgorithms}
                              {@algorithmIdentifier.algorithm}))
  }

Same issue occurs here:

Current:
  Signatures are also used in the CRL list ASN.1 representation from
  [RFC5280] below. In a X.509 CRL, a signature is encoded with an
  algorithm identifier in the signatureAlgorithm attribute and a
  signatureValue attribute that contains the actual signature.

   CertificateList  ::=  SIGNED{ TBSCertList }

-->


3) <!-- [rfced] May we rephrase this as "deliver a secure implementation 
with greater ease"?  In addition, to what does "it" refer - perhaps it 
should be "they"? 

Original:
   While deliberate
   design decisions such as these can help to deliver a greater ease of
   secure implementation - particularly against side-channel attacks -
   it does not necessarily provide resistance to more powerful attacks
   such as differential power analysis.
-->


4) <!-- [rfced] Should "key pair" be "keypair" here as used elsewhere in 
the document?  

Original:
   Non-repudiation refers to the assurance that the owner
   of a signature key pair that was capable of generating an existing
   signature corresponding to certain data cannot convincingly deny
   having signed the data, unless its private key was compromised.
-->


5) <!-- [rfced] [FIPS204] FYI: We have updated the date for this reference 
from August 2023 to August 2024. We also replaced the original URL 
(https://csrc.nist.gov/projects/post-quantum-cryptography) with the one 
that points to the most recent version of FIPS 204 
(https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf).
-->


6) <!-- [rfced] [CSOR] FYI: We updated the date for this reference from 20 
August 2024 to 13 June 2025 to match the date provided at the URL.
-->


7) <!-- [rfced] [CDFFJ21] Please review. The original date for this 
reference is 2021. The version of this paper in the Cryptology ePrint 
Archive was updated in October 2023 (see the "Note" at this 
URL: https://eprint.iacr.org/2020/1525). 

The 2021 version is available for free from IEEE - 
https://ieeexplore.ieee.org/document/9519420

Should this reference point to the updated (2023) version at the Cryptology
ePrint Archive or to the 2021 version of this paper?
-->


8) <!-- [rfced] [NIST-PQC] FYI: We have updated the date for this reference 
from 20 December 2016 to 28 July 2025 to match the date provided at the URL. 
-->


9) <!-- [rfced] Please consider whether "traditional" has a universal 
meaning as used here: 

   Instead of defining the strength of a quantum algorithm in a
   traditional manner using the imprecise notion of bits of security,
   NIST has instead elected to define security levels by picking a
   reference scheme, which NIST expects to offer notable levels of
   resistance to both quantum and classical attack.
-->


10) <!-- [rfced] We are having trouble understanding "then" in this 
sentence.  Does it indicate a later step or perhaps it should be deleted 
altogether? 

Original:
   The second and third examples would not be detected by
   implementations that do not regenerate the public key from the
   private key, or neglect to then check consistency of tr or t_0.

Perhaps A:
   The second and third examples would not be detected by
   implementations that do not regenerate the public key from the
   private key and then neglect then check consistency of tr or t_0.

Perhaps B: 
   The second and third examples would not be detected by
   implementations that do not regenerate the public key from the
   private key or that neglect to check consistency of tr or t_0.
-->


11) <!-- [rfced] Should "pre-hash" and "prehash" be consistent throughout?  
For example: 

Original:
   Pre-hash operation:
...
Figure 2: Computeμ prehash operation
-->


12) <!-- [rfced] The following lines extended beyond 72 characters.  We 
folded the lines as follows.  Please let us know if any corrections are 
needed. 

Original: 
  # The functions `BytesToBits` and `IntegerToBytes` are defined in FIPS 204.

Current: 
  # The functions `BytesToBits` and `IntegerToBytes` are defined 
  # in FIPS 204.


Original: 
    # ... identical to FIPS 204 Algorithm 7, but with Line 6 replaced with

Current: 
    # ... identical to FIPS 204 Algorithm 7, but with Line 6 replaced 
    # with
-->


13) <!-- [rfced] We are having trouble parsing "defaulting is Externalμ to 
false".  Please review. 

Original: 
ML-DSA.Signμ_internal(sk, M', rnd, isExternalμ=false):
    # μ can be passed as an argument instead of M'
    # defaulting is Externalμ to false means that
    # this modified version of Sign_internal can be used
    # in place of the original without interfering with
    # functioning of pure ML-DSA mode.
-->


14) <!-- [rfced] Please review <tt> throughout the document for correctness 
and consistent use.  Please see the list of <tt> use at the following 
location: 
  https://www.rfc-editor.org/authors/rfc9881tt2.txt

The list has been alphabetized and entries are listed only once (that is, 
if <tt> is used multiple times for the same term, it is only listed once).  

Note that we did not review each item on the list.  These are our notes and 
questions on the items we checked: 

a) <tt>expanded</tt> - Should instances of <tt>expanded</tt> be 
<tt>expandedKey</tt>?  

For example:
   For each security level,
   we show the seed-only format (using a context-specific <tt>[0]</tt> primitive
   tag with an implicit encoding of <tt>OCTET STRING</tt>), the 
<tt>expanded</tt>
   format, and <tt>both</tt> formats together.</t>

b) <tt>seed</tt> - Should occurrences of "seed-only format" be 
"<tt>seed</tt> format"?  

For example: 
   For each security
   level, we show the seed-only format (using a context-specific [0]
   primitive tag with an implicit encoding of OCTET STRING), the
   expanded format, and both formats together.

b) <tt>OCTET STRING</tt> - seems to be used consistently in <tt> outside of 
code

c) <tt>OneAsymmetricKey</tt> - Below are examples where "OneAsymmetricKey" 
does not appear in <tt>: 

        <t>When encoding an ML-DSA private key in a OneAsymmetricKey 
object, any of these three formats may be used, though the seed format is
<bcp14>RECOMMENDED</bcp14> for storage efficiency.</t>

Note that these are the sizes of the raw keys, not including
ASN.1 encoding overhead from OneAsymmetricKey and SubjectPublicKeyInfo
wrappers.

d) <tt>PUBLIC-KEY</tt> - seems to be used consistently in <tt> outside of 
code

-->


15) <!-- [rfced] Please review each artwork element and let us know if any 
should be marked as sourcecode (or another element) instead.

We updated a number of instances of <artwork> to <sourcecode type="asn.1">.  
Please review closely and let us know if any corrections are needed.  

Please let us know if any instances of <artwork> should be <sourcecode> and 
whether type="" should be set.  The current list of types is available at 
<https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types>.  If it 
does not contain an applicable type, then feel free to let us know.  Note 
that it is also acceptable to leave the "type" attribute not set.  
-->


16) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature 
typically result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should 
still be reviewed as a best practice.
-->


Thank you.

RFC Production Center


On Oct 8, 2025, at 5:54 PM, [email protected] wrote:

*****IMPORTANT*****

Updated 2025/10/08

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and 
approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies 
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties 
(e.g., Contributors or Working Group) as necessary before providing 
your approval.

Planning your review 
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

   Please review and resolve any questions raised by the RFC Editor 
   that have been included in the XML file as comments marked as 
   follows:

   <!-- [rfced] ... -->

   These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

   Please ensure that you review any changes submitted by your 
   coauthors.  We assume that if you do not speak up that you 
   agree to changes submitted by your coauthors.

*  Content 

   Please review the full content of the document, as this cannot 
   change once the RFC is published.  Please pay particular attention to:
   - IANA considerations updates (if applicable)
   - contact information
   - references

*  Copyright notices and legends

   Please review the copyright notice and legends as defined in
   RFC 5378 and the Trust Legal Provisions 
   (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

   Please review the markup in the XML file to ensure that elements of  
   content are correctly tagged.  For example, ensure that <sourcecode> 
   and <artwork> are set correctly.  See details at 
   <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

   Please review the PDF, HTML, and TXT files to ensure that the 
   formatted output, as generated from the markup in the XML file, is 
   reasonable.  Please note that the TXT will have formatting 
   limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all 
the parties CCed on this message need to see your changes. The parties 
include:

   *  your coauthors
   
   *  [email protected] (the RPC team)

   *  other document participants, depending on the stream (e.g., 
      IETF Stream participants are your working group chairs, the 
      responsible ADs, and the document shepherd).
     
   *  [email protected], which is a new archival mailing list 
      to preserve AUTH48 conversations; it is not an active discussion 
      list:
     
     *  More info:
        
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
     
     *  The archive itself:
        https://mailarchive.ietf.org/arch/browse/auth48archive/

     *  Note: If only absolutely necessary, you may temporarily opt out 
        of the archiving of messages (e.g., to discuss a sensitive matter).
        If needed, please add a note at the top of the message that you 
        have dropped the address. When the discussion is concluded, 
        [email protected] will be re-added to the CC list and 
        its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
 — OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit 
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text, 
and technical changes.  Information about stream managers can be found in 
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files 
-----

The files are available here:
   https://www.rfc-editor.org/authors/rfc9881.xml
   https://www.rfc-editor.org/authors/rfc9881.html
   https://www.rfc-editor.org/authors/rfc9881.pdf
   https://www.rfc-editor.org/authors/rfc9881.txt

Diff file of the text:
   https://www.rfc-editor.org/authors/rfc9881-diff.html
   https://www.rfc-editor.org/authors/rfc9881-rfcdiff.html (side by side)

Diff of the XML: 
   https://www.rfc-editor.org/authors/rfc9881-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
   https://www.rfc-editor.org/auth48/rfc9881

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9881 (draft-ietf-lamps-dilithium-certificates-13)

Title            : Internet X.509 Public Key Infrastructure - Algorithm 
Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)
Author(s)        : J. Massimo, P. Kampanakis, S. Turner, B. Westerbaan
WG Chair(s)      : Russ Housley, Tim Hollebeek
Area Director(s) : Deb Cooley, Paul Wouters


-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to