<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-sphincs-plus-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="jose-cose-sphincs-plus">SLH-DSA for JOSE and COSE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-sphincs-plus-04"/>
    <author fullname="Michael Prorock">
      <organization>mesur.io</organization>
      <address>
        <email>mprorock@mesur.io</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Rafael Misoczki">
      <organization>Google</organization>
      <address>
        <email>rafaelmisoczki@google.com</email>
      </address>
    </author>
    <author fullname="Michael Osborne">
      <organization>IBM</organization>
      <address>
        <email>osb@zurich.ibm.com</email>
      </address>
    </author>
    <author fullname="Christine Cloostermans">
      <organization>NXP</organization>
      <address>
        <email>christine.cloostermans@nxp.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Security</area>
    <workgroup>CBOR Object Signing and Encryption</workgroup>
    <keyword>JOSE</keyword>
    <keyword>COSE</keyword>
    <keyword>PQC</keyword>
    <keyword>SPHINCS+</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 64?>

<t>This document describes JOSE and COSE serializations for SLH-DSA, which was derived from SPHINCS+, a Post-Quantum Cryptography (PQC) based digital signature scheme.</t>
      <t>This document does not define any new cryptography, only seralizations of existing cryptographic systems described in <xref target="FIPS-205"/>.</t>
      <t>Note to RFC Editor: This document should not proceed to AUTH48 until NIST completes paramater tuning and selection as a part of the <eref target="https://csrc.nist.gov/projects/post-quantum-cryptography">PQC</eref> standardization process.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://cose-wg.github.io/draft-ietf-cose-sphincs-plus/draft-ietf-cose-sphincs-plus.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-sphincs-plus/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/draft-ietf-cose-sphincs-plus"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>SLH-DSA is derived from Version 3.1 of SPHINCS+, as noted in <xref target="FIPS-205"/>.</t>
      <t>SPHINCS+ is one of the post quantum cryptography algorithms selected in <xref target="NIST-PQC-2022"/>.</t>
      <t>TODO: Add complete examples for <tt>SLH-DSA-SHA2-128s</tt>, <tt>SLH-DSA-SHAKE-128s</tt>, <tt>SLH-DSA-SHA2-128f</tt>... ( all of them? really?)</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-slh-dsa-algorithm-family">
      <name>The SLH-DSA Algorithm Family</name>
      <t>The SLH-DSA Signature Scheme is paramaterized to support different security level.</t>
      <t>This document requests the registration of the following algorithms in <xref target="IANA.jose"/>:</t>
      <table align="left" anchor="jose-algorithms">
        <name>JOSE algorithms for SLH-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">alg</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">SLH-DSA-SHA2-128s</td>
            <td align="left">SLH-DSA-SHA2-128s</td>
            <td align="left">JSON Web Signature Algorithm for SLH-DSA-SHA2-128s</td>
          </tr>
          <tr>
            <td align="left">SLH-DSA-SHAKE-128s</td>
            <td align="left">SLH-DSA-SHAKE-128s</td>
            <td align="left">JSON Web Signature Algorithm for SLH-DSA-SHAKE-128s</td>
          </tr>
          <tr>
            <td align="left">SLH-DSA-SHA2-128f</td>
            <td align="left">SLH-DSA-SHA2-128f</td>
            <td align="left">JSON Web Signature Algorithm for SLH-DSA-SHA2-128f</td>
          </tr>
        </tbody>
      </table>
      <t>This document requests the registration of the following algorithms in <xref target="IANA.cose"/>:</t>
      <table align="left" anchor="cose-algorithms">
        <name>COSE algorithms for SLH-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">alg</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">SLH-DSA-SHA2-128s</td>
            <td align="left">TBD (requested assignment -51)</td>
            <td align="left">CBOR Object Signing Algorithm for SLH-DSA-SHA2-128s</td>
          </tr>
          <tr>
            <td align="left">SLH-DSA-SHAKE-128s</td>
            <td align="left">TBD (requested assignment -52)</td>
            <td align="left">CBOR Object Signing Algorithm for SLH-DSA-SHAKE-128s</td>
          </tr>
          <tr>
            <td align="left">SLH-DSA-SHA2-128f</td>
            <td align="left">TBD (requested assignment -53)</td>
            <td align="left">CBOR Object Signing Algorithm for SLH-DSA-SHA2-128f</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="the-slh-dsa-key-type">
      <name>The SLH-DSA Key Type</name>
      <t>Private and Public Keys are produced to enable the sign and verify opertaions for each of the SLH-DSA Algorithms.</t>
      <t>This document requests the registration of the following key types in <xref target="IANA.jose"/>:</t>
      <table align="left" anchor="jose-key-type">
        <name>JSON Web Key Type for SLH-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">kty</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">SLH-DSA</td>
            <td align="left">SLH-DSA</td>
            <td align="left">JSON Web Key Type for the SLH-DSA Algorithm Family.</td>
          </tr>
        </tbody>
      </table>
      <t>This document requests the registration of the following algorithms in <xref target="IANA.cose"/>:</t>
      <table align="left" anchor="cose-key-type">
        <name>COSE Key Type for SLH-DSA</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">kty</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">SLH-DSA</td>
            <td align="left">TBD (requested assignment 8)</td>
            <td align="left">COSE Key Type for the SLH-DSA Algorithm Family.</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The following considerations <bcp14>SHOULD</bcp14> apply to all parmeter sets described
in this specification, unless otherwise noted.</t>
      <t>Care should be taken to ensure "kty" and intended use match, the
algorithms described in this document share many properties with other
cryptographic approaches from related families that are used for
purposes other than digital signatures.</t>
      <section anchor="validating-public-keys">
        <name>Validating public keys</name>
        <t>All algorithms in that operate on public keys require first validating
those keys. For the sign, verify and proof schemes, the use of
KeyValidate is <bcp14>REQUIRED</bcp14>.</t>
      </section>
      <section anchor="side-channel-attacks">
        <name>Side channel attacks</name>
        <t>Implementations of the signing algorithm <bcp14>SHOULD</bcp14> protect the secret key
from side-channel attacks. Multiple best practices exist to protect
against side-channel attacks. Any implementation of the the Sphincs+
signing algorithms <bcp14>SHOULD</bcp14> utilize the following best practices at a
minimum:</t>
        <ul spacing="normal">
          <li>
            <t>Constant timing - the implementation should ensure that constant time
is utilized in operations</t>
          </li>
          <li>
            <t>Sequence and memory access persistance - the implemention <bcp14>SHOULD</bcp14>
execute the exact same sequence of instructions (at a machine level)
with the exact same memory access independent of which polynomial is
being operated on.</t>
          </li>
          <li>
            <t>Uniform sampling - care should be given in implementations to preserve
the property of uniform sampling in implementation and to prevent
information leakage.</t>
          </li>
        </ul>
      </section>
      <section anchor="randomness-considerations">
        <name>Randomness considerations</name>
        <t>It is recommended that the all nonces are from a trusted source of
randomness.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="additions-to-existing-registries">
        <name>Additions to Existing Registries</name>
        <section anchor="new-cose-algorithms">
          <name>New COSE Algorithms</name>
          <section anchor="slh-dsa-sha2-128s">
            <name>SLH-DSA-SHA2-128s</name>
            <ul spacing="normal">
              <li>
                <t>Name: SLH-DSA-SHA2-128s</t>
              </li>
              <li>
                <t>Label: TBD (requested assignment -51)</t>
              </li>
              <li>
                <t>Value type: int</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.cose"/></t>
              </li>
              <li>
                <t>Description: CBOR Object Signing Algorithm for SLH-DSA-SHA2-128s</t>
              </li>
            </ul>
          </section>
          <section anchor="slh-dsa-shake-128s">
            <name>SLH-DSA-SHAKE-128s</name>
            <ul spacing="normal">
              <li>
                <t>Name: SLH-DSA-SHAKE-128s</t>
              </li>
              <li>
                <t>Label: TBD (requested assignment -52)</t>
              </li>
              <li>
                <t>Value type: int</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.cose"/></t>
              </li>
              <li>
                <t>Description: CBOR Object Signing Algorithm for SLH-DSA-SHAKE-128s</t>
              </li>
            </ul>
          </section>
          <section anchor="slh-dsa-sha2-128f">
            <name>SLH-DSA-SHA2-128f</name>
            <ul spacing="normal">
              <li>
                <t>Name: SLH-DSA-SHA2-128f</t>
              </li>
              <li>
                <t>Label: TBD (requested assignment -53)</t>
              </li>
              <li>
                <t>Value type: int</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.cose"/></t>
              </li>
              <li>
                <t>Description: CBOR Object Signing Algorithm for SLH-DSA-SHA2-128f</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="new-cose-key-types">
          <name>New COSE Key Types</name>
          <section anchor="slh-dsa">
            <name>SLH-DSA</name>
            <ul spacing="normal">
              <li>
                <t>Name: SLH-DSA</t>
              </li>
              <li>
                <t>Label: TBD (requested assignment 8)</t>
              </li>
              <li>
                <t>Value type: int</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.cose"/></t>
              </li>
              <li>
                <t>Description: COSE Key Type for the SLH-DSA Algorithm Family</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="new-jose-algorithms">
          <name>New JOSE Algorithms</name>
          <t>IANA is requested to add the following entries to the JSON Web Signature and Encryption Algorithms Registry. The following completed registration templates are provided as described in RFC7518.</t>
          <section anchor="slh-dsa-sha2-128s-1">
            <name>SLH-DSA-SHA2-128s</name>
            <ul spacing="normal">
              <li>
                <t>Algorithm Name: SLH-DSA-SHA2-128s</t>
              </li>
              <li>
                <t>Description: JSON Web Signature Algorithm for SLH-DSA-SHA2-128s as described in FIPS 205.</t>
              </li>
              <li>
                <t>Algorithm Usage Location(s): alg</t>
              </li>
              <li>
                <t>JOSE Implementation Requirements: Optional</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.jose"/> Algorithms</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
              <li>
                <t>Algorithm Analysis Documents(s):
<eref target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.ipd.pdf">https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.ipd.pdf</eref></t>
              </li>
            </ul>
          </section>
          <section anchor="slh-dsa-shake-128s-1">
            <name>SLH-DSA-SHAKE-128s</name>
            <ul spacing="normal">
              <li>
                <t>Algorithm Name: SLH-DSA-SHAKE-128s</t>
              </li>
              <li>
                <t>Description: JSON Web Signature Algorithm for SLH-DSA-SHAKE-128s as described in FIPS 205.</t>
              </li>
              <li>
                <t>Algorithm Usage Location(s): alg</t>
              </li>
              <li>
                <t>JOSE Implementation Requirements: Optional</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.jose"/> Algorithms</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
              <li>
                <t>Algorithm Analysis Documents(s):
<eref target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.ipd.pdf">https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.ipd.pdf</eref></t>
              </li>
            </ul>
          </section>
          <section anchor="slh-dsa-sha2-128f-1">
            <name>SLH-DSA-SHA2-128f</name>
            <ul spacing="normal">
              <li>
                <t>Algorithm Name: SLH-DSA-SHA2-128f</t>
              </li>
              <li>
                <t>Description: JSON Web Signature Algorithm for SLH-DSA-SHA2-128f as described in FIPS 205.</t>
              </li>
              <li>
                <t>Algorithm Usage Location(s): alg</t>
              </li>
              <li>
                <t>JOSE Implementation Requirements: Optional</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Value registry: <xref target="IANA.jose"/> Algorithms</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
              <li>
                <t>Algorithm Analysis Documents(s):
<eref target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.ipd.pdf">https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.ipd.pdf</eref></t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="new-jose-key-types">
          <name>New JOSE Key Types</name>
          <t>IANA is requested to add the following entries to the JSON Web Key Types Registry. The following completed registration templates are provided as described in RFC7518 RFC7638.</t>
          <section anchor="slh-dsa-1">
            <name>SLH-DSA</name>
            <ul spacing="normal">
              <li>
                <t>"kty" Parameter Value: SLH-DSA</t>
              </li>
              <li>
                <t>Key Type Description: JSON Web Key Type for the SLH-DSA Algorithm Family.</t>
              </li>
              <li>
                <t>JOSE Implementation Requirements: Optional</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="new-json-web-key-parameters">
          <name>New JSON Web Key Parameters</name>
          <t>IANA is requested to add the following entries to the JSON Web Key Parameters Registry. The following completed registration templates are provided as described in RFC7517, and RFC7638.</t>
          <section anchor="ml-dsa-public-key">
            <name>ML-DSA Public Key</name>
            <ul spacing="normal">
              <li>
                <t>Parameter Name: pub</t>
              </li>
              <li>
                <t>Parameter Description: Public or verification key</t>
              </li>
              <li>
                <t>Used with "kty" Value(s): SLH-DSA</t>
              </li>
              <li>
                <t>Parameter Information Class: Public</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
            </ul>
          </section>
          <section anchor="ml-dsa-secret-key">
            <name>ML-DSA Secret Key</name>
            <ul spacing="normal">
              <li>
                <t>Parameter Name: priv</t>
              </li>
              <li>
                <t>Parameter Description: Secret, private or signing key</t>
              </li>
              <li>
                <t>Used with "kty" Value(s): SLH-DSA</t>
              </li>
              <li>
                <t>Parameter Information Class: Private</t>
              </li>
              <li>
                <t>Change Controller: IETF</t>
              </li>
              <li>
                <t>Specification Document(s): RFC XXXX</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="IANA.jose" target="http://www.iana.org/assignments/jose">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose" target="http://www.iana.org/assignments/cose">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS-205" target="https://csrc.nist.gov/pubs/fips/205/ipd">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NIST-PQC-2022" target="https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022">
          <front>
            <title>Selected Algorithms 2022</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 298?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="jose">
        <name>JOSE</name>
        <section anchor="key-pair">
          <name>Key Pair</name>
          <figure anchor="SLH-DSA-SHA2-128s-private-jwk">
            <name>Example SLH-DSA-SHA2-128s Private JSON Web Key</name>
            <sourcecode type="json"><![CDATA[
{
  "kty": "SLH-DSA",
  "alg": "SLH-DSA-SHA2-128s",
  "pub": "V53SIdVF...uvw2nuCQ",
  "priv": "V53SIdVF...cDKLbsBY"
}
]]></sourcecode>
          </figure>
          <figure anchor="SLH-DSA-SHA2-128s-public-jwk">
            <name>Example SLH-DSA-SHA2-128s Public JSON Web Key</name>
            <sourcecode type="json"><![CDATA[
{
  "kty": "SLH-DSA",
  "alg": "SLH-DSA-SHA2-128s",
  "pub": "V53SIdVF...uvw2nuCQ"
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="thumbprint-uri">
          <name>Thumbprint URI</name>
          <t>TODO</t>
        </section>
        <section anchor="json-web-signature">
          <name>JSON Web Signature</name>
          <figure anchor="SLH-DSA-SHA2-128s-jose-protected-header">
            <name>Example SLH-DSA-SHA2-128s Decoded Protected Header</name>
            <sourcecode type="json"><![CDATA[
{
  "alg": "SLH-DSA-SHA2-128s"
}
]]></sourcecode>
          </figure>
          <figure anchor="SLH-DSA-SHA2-128s-jose-jws">
            <name>Example SLH-DSA-SHA2-128s Compact JSON Web Signature</name>
            <artwork><![CDATA[
eyJhbGciOiJ...LCJraWQiOiI0MiJ9\
.\
eyJpc3MiOiJ1cm46d...XVpZDo0NTYifQ\
.\
5MSEgQ0dZB4SeLC...AAAAAABIhMUE
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE</name>
        <section anchor="key-pair-1">
          <name>Key Pair</name>
          <figure anchor="SLH-DSA-SHA2-128s-private-cose-key">
            <name>Example SLH-DSA-SHA2-128s Private COSE Key</name>
            <sourcecode type="cbor-diag"><![CDATA[
{                                   / COSE Key                    /
  1: 8,                             / SLH-DSA Key Type            /
  3: -51,                           / SLH-DSA-SHA2-128s Algorithm /
  -13: h'7803c0f9...3f6e2c70',      / SLH-DSA Private Key         /
  -14: h'7803c0f9...3bba7abd',      / SLH-DSA Public Key          /
}
]]></sourcecode>
          </figure>
          <figure anchor="SLH-DSA-SHA2-128s-public-cose-key">
            <name>Example SLH-DSA-SHA2-128s Public COSE Key</name>
            <sourcecode type="cbor-diag"><![CDATA[
{                                   / COSE Key                    /
  1: 8,                             / SLH-DSA Key Type            /
  3: -51,                           / SLH-DSA-SHA2-128s Algorithm /
  -13: h'7803c0f9...3f6e2c70'       / SLH-DSA Private Key         /
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="thumbprint-uri-1">
          <name>Thumbprint URI</name>
          <t>TODO</t>
        </section>
        <section anchor="cose-sign-1">
          <name>COSE Sign 1</name>
          <figure anchor="SLH-DSA-SHA2-128s-cose-protected-header-diagnostic">
            <name>Example SLH-DSA-SHA2-128s COSE Protected Header</name>
            <sourcecode type="cbor-diag"><![CDATA[
{        / Protected                   /
  1: -51 / SLH-DSA-SHA2-128s Algorithm /
}
]]></sourcecode>
          </figure>
          <figure anchor="SLH-DSA-SHA2-128s-cose-sign-1-diagnostic">
            <name>Example SLH-DSA-SHA2-128s COSE Sign 1</name>
            <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1            /
    [
      h'a10139d902',                / Protected              /
      {},                           / Unprotected            /
      h'66616b65',                  / Payload                /
      h'53e855e8...0f263549'        / Signature              /
    ]
)
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
