Network Working Group                                           A. Mitra
Internet-Draft                                      S. S. Chakkaravarthy
Intended status: Standards Track                                A. Ghosh
Expires: 4 October 2025                                         D. P. VS
                                                       VIT-AP University
                                                            2 April 2025


                     ML-DSA for Web Authentication
                     draft-vitap-ml-dsa-webauthn-00

Abstract

   This document describes implementation of Passwordless authentication
   in Web Authentication (WebAuthn) using Module-Lattice-Based Digital
   Signature Standard (ML-DSA), a Post-Quantum Cryptography (PQC)
   digital signature scheme defined in FIPS 204.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 4 October 2025.

Copyright Notice

   Copyright (c) 2025 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.



Mitra, et al.            Expires 4 October 2025                 [Page 1]

Internet-Draft               ml-dsa-webauthn                  April 2025


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   2
   3.  Background on Post-Quantum Cryptography . . . . . . . . . . .   3
     3.1.  Motivation for ML-DSA in WebAuthn . . . . . . . . . . . .   3
   4.  ML-DSA Integration in WebAuthn  . . . . . . . . . . . . . . .   3
     4.1.  ML-DSA Key Representation in COSE . . . . . . . . . . . .   3
     4.2.  Signature Generation and Verification . . . . . . . . . .   5
   5.  Authenticator Behavior  . . . . . . . . . . . . . . . . . . .   5
     5.1.  Credential Creation . . . . . . . . . . . . . . . . . . .   5
     5.2.  Authentication Flow . . . . . . . . . . . . . . . . . . .   8
     5.3.  Backward Compatibility Consideration  . . . . . . . . . .  11
   6.  Client and Platform Considerations  . . . . . . . . . . . . .  11
     6.1.  COSE Algorithm Support in WebAuthn Clients  . . . . . . .  11
     6.2.  Handling large signatures and keys  . . . . . . . . . . .  11
     6.3.  Error Handling and Fallback mechanisms  . . . . . . . . .  11
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
     7.1.  Resistance to Quantum Attacks . . . . . . . . . . . . . .  11
     7.2.  Storage security and Key management . . . . . . . . . . .  12
     7.3.  Implementation Best Practices . . . . . . . . . . . . . .  12
   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  12
     8.1.  Additions to Existing Registries  . . . . . . . . . . . .  13
       8.1.1.  Algorithms to be added  . . . . . . . . . . . . . . .  13
       8.1.2.  New COSE Key Types  . . . . . . . . . . . . . . . . .  14
       8.1.3.  New COSE Key Type Parameters  . . . . . . . . . . . .  14
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  14
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  14
     9.2.  Informative References  . . . . . . . . . . . . . . . . .  15
   Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  16
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  16

1.  Introduction

   This document describes how to use ML-DSA keys and signature as
   described in [FIPS-204] with [WebAuthn].

2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

   Some examples in this specification are truncated with "..." for
   readability.




Mitra, et al.            Expires 4 October 2025                 [Page 2]

Internet-Draft               ml-dsa-webauthn                  April 2025


3.  Background on Post-Quantum Cryptography

   This section describes a generic backround of Post-Quantum
   Cryptography, Web Authentication and Phishing Resistance.  Post-
   Quantum Cryptography is defined to be a set of cryptographic
   algorithms that are not vulnerable against a malicious actor in
   possession of a large scale Quantum Computer.  [FIPS-204] has
   described Module-Lattice-Based Digital Signature Algorithm which is
   not vulnerable to attacks involving a large-scale quantum computer.

3.1.  Motivation for ML-DSA in WebAuthn

   With the wide range adoption of phishing-resistant passwordless
   authentication standard like Security Keys, Passkeys and Device
   attestation following the FIDO2 Specifications, the adopted
   cryptographic standards for authentication have been primarily ES256
   (Elliptic Curve Digital Signature Algorithm with SHA-256) and RS256
   (RSA with SHA-256) as defined in [FIPS-186-5].  Though most
   authenticators support other algorithms as well, the widely used
   default algorithms- ES256 and RS256 are deemed to be insecure against
   adversaries employing large-scale quantum computers.

   Hence, the adoption of ML-DSA for WebAuthn would be necessary to
   secure digital identities and accounts from such adversaries.

4.  ML-DSA Integration in WebAuthn

   This section describes the implementation of WebAuthn with ML-DSA.

4.1.  ML-DSA Key Representation in COSE

   [I-D.draft-ietf-cose-dilithium-05] describes CBOR Object Signing and
   Encryption (COSE) Serialization for ML-DSA.  It is to be noted that
   the COSE representation of only 'Public key' or 'Verifying key' is
   used in WebAuthn.  Hence, the COSE Representation of private keys are
   beyond the scope of this document.

   ML-DSA Signature Scheme is parameterized to support different
   security levels.  In this document, the abbreviations of ML-DSA-44,
   ML-DSA-65 and ML-DSA-87 are used to refer to ML-DSA with the
   parameter choices given in Table 1 of FIPS-204.

   Along with [I-D.draft-ietf-cose-dilithium-05], this document requests
   the registration of the following algorithms in [IANA.cose]:







Mitra, et al.            Expires 4 October 2025                 [Page 3]

Internet-Draft               ml-dsa-webauthn                  April 2025


   +===========+=================+=========================+
   | Name      | value           | Description             |
   +===========+=================+=========================+
   | ML-DSA-44 | TBD (requested  | CBOR Object Signing     |
   |           | assignment -48) | Algorithm for ML-DSA-44 |
   +-----------+-----------------+-------------------------+
   | ML-DSA-65 | TBD (requested  | CBOR Object Signing     |
   |           | assignment -49) | Algorithm for ML-DSA-65 |
   +-----------+-----------------+-------------------------+
   | ML-DSA-87 | TBD (requested  | CBOR Object Signing     |
   |           | assignment -50) | Algorithm for ML-DSA-87 |
   +-----------+-----------------+-------------------------+

              Table 1: COSE algorithms for ML-DSA

   In accordance with the Algorithm Key Paid Type section of
   [I-D.draft-ietf-cose-dilithium-05], when present in AKP Keys, the
   "pub" parameter has the following constraints:

   The "pub" parameter is the ML-DSA public key, as described in
   Section 5.3 of FIPS-204.

   The size of "pub", and the associated signature for each of these
   algorithms is defined in Table 2 of FIPS-204, and repeated here for
   convenience:

   +===========+=============+============+================+
   | Algorithm | Private Key | Public Key | Signature Size |
   +===========+=============+============+================+
   | ML-DSA-44 | 2560        | 1312       | 2420           |
   +-----------+-------------+------------+----------------+
   | ML-DSA-65 | 4032        | 1952       | 3309           |
   +-----------+-------------+------------+----------------+
   | ML-DSA-87 | 4896        | 2592       | 4627           |
   +-----------+-------------+------------+----------------+

      Table 2: Sizes (in bytes) of keys and signatures of
                             ML-DSA

   These algorithms are used to produce signatures as described in
   Algorithm 2 of FIPS-204.

   Signatures are encoded as bytestrings using the algorithms defined in
   Section 7.2 of FIPS-204.







Mitra, et al.            Expires 4 October 2025                 [Page 4]

Internet-Draft               ml-dsa-webauthn                  April 2025


4.2.  Signature Generation and Verification

   Signature generation is done in accordance with Section 5.2 of FIPS-
   204.  Signature Verification is done in accordance with Section 5.3
   of FIPS-204.

   If small keys or signature is needed, ML-DSA might not be the ideal
   option.  Furthermore, in usage scenarios expecting swifter
   processing, ML-DSA-87 might not be the best option.  Therefore, using
   ML-DSA-44 and ML-DSA-65 with WebAuthn is advised.

5.  Authenticator Behavior

   This section describes how an authenticator, roaming or platform
   would implement ML-DSA.

   The authenticator MUST have a secure storage for storing
   cryptographic secrets which SHOULD NOT be able to export the secrets
   in an unauthorized manner.

5.1.  Credential Creation

         +---------------+                    +--------+                                   +-----------+
         |               |                    |        |                                   |           |
         | Authenticator |                    | Client |                                   | RP Server |
         |               |                    |        |                                   |           |
         +-------+-------+                    +---+----+                                   +-----+-----+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |      Get Challenge                           |
                 |                                +--------------------------------------------->|
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                   Challenge                  |
                 |                                |<---------------------------------------------+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |  Credential Creation Request   |                                              |



Mitra, et al.            Expires 4 October 2025                 [Page 5]

Internet-Draft               ml-dsa-webauthn                  April 2025


                 |<-------------------------------+                                              |
+----------------+   (Challenge)                  |                                              |
| Generate       |                                |                                              |
| Keypair        |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
+--------------->|                                |                                              |
                 |                                |                                              |
+----------------+                                |                                              |
| Sign challenge |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
|                |                                |                                              |
+--------------->|                                |                                              |
                 |                                |                                              |
                 |  Assertion Response            |                                              |
                 +------------------------------->|                                              |
                 |  (Signed Challenge)            |     Assertion                                |
                 |                                +--------------------------------------------->|
                 |                                |                                              |
                 |                                |                                              +--------------------+
                 |                                |                                              |  Verify            |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |<-------------------+
                 |                                |                                              |
                 |                                |                                              +--------------------+
                 |                                |                                              |   Save public key  |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |                    |
                 |                                |                                              |<-------------------+
                 |                                |     Authentication response                  |
                 |                                |<---------------------------------------------+
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |
                 |                                |                                              |




Mitra, et al.            Expires 4 October 2025                 [Page 6]

Internet-Draft               ml-dsa-webauthn                  April 2025


   [WebAuthn] defines the credential creation API.  This API takes a
   public key credential creation object, containing a cryptographic
   challenge, the Relying Party ID (RP ID), User details, and public key
   credential parameters.  The public key credential parameters define
   the accepted algorithms.

   An example of public key credential creation object is:

{
  challenge: new Uint8Array([215, 150, 119, 213, 215, 247, 188, 15, 142, 10, 53, 135, 17, 205, 130, 133, 158, 32, 113, 0, 62, 67, 112, 191, 123, 180, 224, 151, 233, 114, 68, 225]),
  rp: { id: "example.com", name: "Example Corporation" },
  user: {
    id: new Uint8Array([79, 252, 83, 72, 214, 7, 89, 26]),
    name: "johndoe",
    displayName: "John Doe",
  },
  pubKeyCredParams: [{ type: "public-key", alg: -7 }, { type: "public-key", alg: -49 }],
}

   The web application invokes the Navigator.credentials.create()
   function with the Public Key Credential Creation Object.  The client
   web browser, or an application invokes the authenticator API defined
   in [CTAP].  The public key credential creation object is CBOR encoded
   and sent to the authenticator device over a chosen transport method
   which includes but is not limited to USB HID, BLE and NFC.

   An example of CBOR Encoded Public Key Credential Creation object is:

h'A50158201637B26333915747DBDC6C630C0165405A64939AE8F6E4FC39414F853F702F1602A2626964696C6F63616C686F7374646E616D656B44656D6F2073657276657203A3626964504EC1D4219F294FB4A0BC0CD29D485AFC646E616D6566615F757365726B646973706C61794E616D6567412E20557365720481A263616C67382F64747970656A7075626C69632D6B657907A1627576F5'

   The authenticator MUST verify whether any credential mentioned in the
   list of "excludeCredentials" in the public key credential creation
   object is already present on the authenticator, and in such cases it
   will return the error code in accordance with [CTAP].  Further
   authenticator MUST perform all additional checks involving
   authenticator PIN, User presence, user verification etc in accordance
   with Section 5.1 of CTAP.

   The authenticator SHALL use ML-DSA-65 or ML-DSA-44 if included in alg
   -49 or -48 respectively are available in the public key credential
   parameters.  If the parameters are not present, the authenticator
   SHALL behave in accordance with the "Backward Compatibility
   Considerations" section of this document.

   The authenticator generates ML-DSA keypair in accordance with
   Section 5.1 of FIPS 204 and unique Key ID.  The public key is COSE
   encoded following [I-D.draft-ietf-cose-dilithium-05] and is a part of
   the attestedCredentialData.



Mitra, et al.            Expires 4 October 2025                 [Page 7]

Internet-Draft               ml-dsa-webauthn                  April 2025


   After passing all checks in accordance with section 5.1 of CTAP, the
   authenticator SHOULD create the attestation statement.  The authData
   is created in accordance with WebAuthn and CTAP specifications and
   the clientDataHash is appended to it.  This is signed with the
   private key of the generated keypair.  The attestation statement is
   generated in accordance with CTAP and WebAuthn.

   The ML-DSA private key is to be stored in accordance with the
   "Storage security and Key management" section of this document.

   The attestation statement is encoded in CBOR and returned to the
   client application via the same transport method.

5.2.  Authentication Flow

      +---------------+                    +--------+                                   +-----------+
      |               |                    |        |                                   |           |
      | Authenticator |                    | Client |                                   | RP Server |
      |               |                    |        |                                   |           |
      +-------+-------+                    +---+----+                                   +-----+-----+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |      Get Challenge                           |
              |                                +--------------------------------------------->|
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                   Challenge                  |
              |                                |<---------------------------------------------+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |   Assertion Request            |                                              |
              |<-------------------------------+                                              |
              |   (Challenge)                  |                                              |
+-------------+                                |                                              |
|Sign         |                                |                                              |
|Challenge    |                                |                                              |
|             |                                |                                              |
|             |                                |                                              |



Mitra, et al.            Expires 4 October 2025                 [Page 8]

Internet-Draft               ml-dsa-webauthn                  April 2025


+------------>|                                |                                              |
              |  Assertion Response            |                                              |
              +------------------------------->|                                              |
              |  (Signed Challenge)            |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |     Assertion                                |
              |                                +--------------------------------------------->|
              |                                |                                              |
              |                                |                                              +--------------------+
              |                                |                                              |     Verify         |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |                    |
              |                                |                                              |<-------------------+
              |                                |     Authentication response                  |
              |                                |<---------------------------------------------+
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |
              |                                |                                              |

   [WebAuthn] defines the credential request API.  This API takes a
   public key credential request object, containing a cryptographic
   challenge, the Relying Party ID (RP ID) and optionally a list of
   allowed credentials.




Mitra, et al.            Expires 4 October 2025                 [Page 9]

Internet-Draft               ml-dsa-webauthn                  April 2025


   An example of public key credential request object is:

{
  challenge: new Uint8Array([215, 150, 119, 213, 215, 247, 188, 15, 142, 10, 53, 135, 17, 205, 130, 133, 158, 32, 113, 0, 62, 67, 112, 191, 123, 180, 224, 151, 233, 114, 68, 225]),
  rpId: "example.com",
}

   The web application invokes the Navigator.credentials.get() function
   with the Public Key Credential Request Object.  The client web
   browser, or an application invokes the authenticator API defined in
   [CTAP].  The public key credential request object is CBOR encoded and
   sent to the authenticator device over a chosen transport method which
   includes but is not limited to USB HID, BLE and NFC.

   If a list of allowedCredentials is present, the authenticator must
   discover credentials bound to the same RP ID which is present in the
   list.  If no such credential is present, it will return the error
   code in accordance with [CTAP].  Further authenticator MUST perform
   all additional checks involving authenticator PIN, User presence,
   user verification etc in accordance with Section 5.2 of CTAP.

   The authenticator, on discovering a suitable credential for
   authentication SHOULD verify the algorithm.  If it is not ML-DSA, the
   authenticator SHALL behave in accordance with the "Backward
   Compatibility Considerations" section of this document.

   The credential is retrieved in accordance with the "Storage security
   and Key management" section of this document.

   After passing all checks in accordance with section 5.2 of CTAP, the
   authenticator SHOULD create the assertion statement.  The authData is
   created in accordance with WebAuthn and CTAP specifications and the
   clientDataHash is appended to it.  This is signed with the decrypted
   ML-DSA private key.  The assertion response is generated in
   accordance with CTAP and WebAuthn.

   The assertion response is encoded in CBOR and returned to the client
   application via the same transport method.

   All memory addresses used to handle the ML-DSA private key is
   immediately zeroized.

   The authenticator getNextAssertion() function specification is to be
   similarly implemented in accordance with [CTAP].







Mitra, et al.            Expires 4 October 2025                [Page 10]

Internet-Draft               ml-dsa-webauthn                  April 2025


5.3.  Backward Compatibility Consideration

   The authenticator SHOULD default to using RS256 and ES256 algorithms
   following FIPS-186-5 if the Relying Party (RP) does not support ML-
   DSA, which can be verified by inpecting the Public Key Credential
   Parameters field during credential creation.

6.  Client and Platform Considerations

   This section describes the considerations about the Client and
   Platform.

6.1.  COSE Algorithm Support in WebAuthn Clients

   The CTAP implementations on client, for example Windows Hello for
   Microsoft Windows based systems, iCloud Keychain for Apple systems,
   Google Password Manager, Dashlane, OnePassword and other browser
   based implementations for Linux SHOULD have support for ML-DSA
   Algorithms in accordance with COSE.  Further, Platform Authenticators
   for such devices are RECOMMENDED to have support for ML-DSA Key
   Generation and signing in accordance with this document.

6.2.  Handling large signatures and keys

   It is considered that the chosen transport methods including but not
   limited to USB HID, BLE and NFC are able to perform exchanges of the
   CBOR encoded data which may be often over 2000 bytes.  The use of
   attestion certificates may increase the length even more.

6.3.  Error Handling and Fallback mechanisms

   In case of errors involving ML-DSA key generation and signing, the
   authenticator may fallback to using ES256 or RS256 algoritms.  In
   case of errors involving communication with the client, the
   authenticator may handle it in accordance with [CTAP].

7.  Security Considerations

   The security considerations of [RFC9053] applies to this
   specification as well.

   A detailed security analysis of ML-DSA is beyond the scope of this
   specification, see [FIPS-204] for additional details.

7.1.  Resistance to Quantum Attacks

   See [FIPS-204] for details on resistance to quantum attacks.




Mitra, et al.            Expires 4 October 2025                [Page 11]

Internet-Draft               ml-dsa-webauthn                  April 2025


7.2.  Storage security and Key management

   It is to be noted that at the time of writing this draft, there is no
   suitable hardware security module (HSM), trusted platform module
   (TPM), Secure Element (SE), Trusted Execution Environment (TEE) with
   native support for ML-DSA.  Hence, secure credential storage is a
   challenge.  To overcome the same, the ML-DSA keys, also referred to
   as credentials, MUST be encrypted with Advanced Ecnryption Standard
   (AES), which is a Post Quantum Symmetric encryption algorithm in
   Galosis Counter Mode (GCM) with 256-bit keys.

   The AES Keys MUST be generated and stored in secure storage, which
   may include a HSM, TPM, SE or TEE.  The ML-DSA Keys may be generated
   on the standard computing environment, outside the secure storage.
   The ML-DSA Credential MUST be encrypted by AES as described above
   before being written to the Flash memory or Disk.  Conversely, the
   same MUST be decrypted by AES in the secure storage before being
   used.

   Any memory location, pointer or heap that has been used to handle the
   ML-DSA Credentials MUST be zeroized immediately after the operation
   is performed.

   This section is to be updated when suitable secure storage modules
   supporting ML-DSA becomes widely available.

7.3.  Implementation Best Practices

   If the amount of space in the secure storage permits, each ML-DSA
   Private key is RECOMMENDED to be encrypted with unique AES keys. *
   Prior to storage, each ML-DSA private key is to be encrypted
   independently using a distinct AES encryption key. * To guarantee
   robust encryption, the AES key size must be at least AES-256. * To
   avoid unwanted access, encrypted keys ought to be kept in Hardware
   Security Modules (HSMs), Secure Elements (SEs), or Trusted Platform
   Modules (TPMs). * NIST SP 800-57 recommendations should be followed
   by key management to provide secure AES key lifecycle management
   (creation, storage, rotation, and disposal). * Only in a trusted
   execution environment (TEE) or secure enclave should the private key
   be decrypted in order to avoid memory leakage.

8.  IANA Considerations









Mitra, et al.            Expires 4 October 2025                [Page 12]

Internet-Draft               ml-dsa-webauthn                  April 2025


8.1.  Additions to Existing Registries

   Along with [I-D.draft-ietf-cose-dilithium-05], this document requests
   the registration of the following entries to the COSE Algorithm
   Registry.  The following completed registration templates are
   provided as described in RFC9053 and RFC9054.

8.1.1.  Algorithms to be added

8.1.1.1.  ML-DSA-44

   *  Name: ML-DSA-44

   *  Value: TBD (requested assignment -48)

   *  Description: CBOR Object Signing Algorithm for ML-DSA-44

   *  Capabilities: [kty]

   *  Reference: RFC XXXX

   *  Recommended: Yes

8.1.1.2.  ML-DSA-65

   *  Name: ML-DSA-65

   *  Value: TBD (requested assignment -49)

   *  Description: CBOR Object Signing Algorithm for ML-DSA-65

   *  Capabilities: [kty]

   *  Reference: RFC XXXX

   *  Recommended: Yes

8.1.1.3.  ML-DSA-87

   *  Name: ML-DSA-87

   *  Value: TBD (requested assignment -50)

   *  Description: CBOR Object Signing Algorithm for ML-DSA-87

   *  Capabilities: [kty]

   *  Reference: RFC XXXX



Mitra, et al.            Expires 4 October 2025                [Page 13]

Internet-Draft               ml-dsa-webauthn                  April 2025


   *  Recommended: Yes

8.1.2.  New COSE Key Types

   IANA is requested to add the following entries to the COSE Key Types
   Registry.  The following completed registration templates are
   provided as described in RFC9053.

8.1.2.1.  AKP

   *  Name: AKP

   *  Value: TBD (requested assignment 7)

   *  Description: COSE Key Type for Algorithm Key Pairs

   *  Capabilities: [kty(7)]

   *  Reference: RFC XXXX

8.1.3.  New COSE Key Type Parameters

   IANA is requested to add the following entries to the COSE Key Type
   Parameters.  The following completed registration templates are
   provided as described in RFC9053.

8.1.3.1.  ML-DSA Public Key

   *  Key Type: TBD (requested assignment 7)

   *  Name: pub

   *  Label: -1

   *  CBOR Type: bstr

   *  Description: Public key

   *  Reference: RFC XXXX

9.  References

9.1.  Normative References








Mitra, et al.            Expires 4 October 2025                [Page 14]

Internet-Draft               ml-dsa-webauthn                  April 2025


   [I-D.draft-ietf-cose-dilithium-05]
              Prorock, M., Steele, O., Misoczki, R., Osborne, M., and C.
              Cloostermans, "ML-DSA for JOSE and COSE", Work in
              Progress, Internet-Draft, draft-ietf-cose-dilithium-05, 18
              December 2024, <https://datatracker.ietf.org/doc/html/
              draft-ietf-cose-dilithium-05>.

   [IANA.cose]
              IANA, "CBOR Object Signing and Encryption (COSE)",
              <https://www.iana.org/assignments/cose>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/rfc/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

   [RFC9053]  Schaad, J., "CBOR Object Signing and Encryption (COSE):
              Initial Algorithms", RFC 9053, DOI 10.17487/RFC9053,
              August 2022, <https://www.rfc-editor.org/rfc/rfc9053>.

   [RFC9679]  Isobe, K., Tschofenig, H., and O. Steele, "CBOR Object
              Signing and Encryption (COSE) Key Thumbprint", RFC 9679,
              DOI 10.17487/RFC9679, December 2024,
              <https://www.rfc-editor.org/rfc/rfc9679>.

9.2.  Informative References

   [CTAP]     "Client To Authenticator Protocol (CTAP)", n.d.,
              <https://fidoalliance.org/specs/fido-v2.0-id-20180227/
              fido-client-to-authenticator-protocol-v2.0-id-
              20180227.html>.

   [FIPS-186-5]
              "Digital Signature Standard (DSS)", n.d.,
              <https://doi.org/10.6028/NIST.FIPS.186-5>.

   [FIPS-204] "Module-Lattice-Based Digital Signature Standard", n.d.,
              <https://doi.org/10.6028/NIST.FIPS.204>.









Mitra, et al.            Expires 4 October 2025                [Page 15]

Internet-Draft               ml-dsa-webauthn                  April 2025


   [I-D.draft-ietf-cose-key-thumbprint]
              Isobe, K., Tschofenig, H., and O. Steele, "CBOR Object
              Signing and Encryption (COSE) Key Thumbprint", Work in
              Progress, Internet-Draft, draft-ietf-cose-key-thumbprint-
              06, 6 September 2024,
              <https://datatracker.ietf.org/doc/html/draft-ietf-cose-
              key-thumbprint-06>.

   [I-D.draft-ietf-lamps-dilithium-certificates]
              Massimo, J., Kampanakis, P., Turner, S., and B.
              Westerbaan, "Internet X.509 Public Key Infrastructure:
              Algorithm Identifiers for ML-DSA", Work in Progress,
              Internet-Draft, draft-ietf-lamps-dilithium-certificates-
              07, 2 February 2025,
              <https://datatracker.ietf.org/doc/html/draft-ietf-lamps-
              dilithium-certificates-07>.

   [SP-500-57]
              "Audit and Evaluation of Computer Security II: System
              Vulnerabilities and Controls", n.d.,
              <https://doi.org/10.6028/NBS.SP.500-57>.

   [WebAuthn] "Web Authentication: An API for accessing Public Key
              Credentials", n.d., <https://www.w3.org/TR/webauthn-2>.

Acknowledgments

   We express our sincere gratitude to Dr. S.  V.  Kota Reddy, Vice
   Chancellor, VIT-AP University, for his unwavering support and
   encouragement throughout this research.  We also extend our heartfelt
   thanks to Dr. Jagadish Chandra Mudiganti, Registrar, VIT-AP
   University, for facilitating a conducive research environment.  Our
   appreciation goes to Dr. Hari Seetha, Director, Centre of Excellence,
   Artificial Intelligence and Robotics (AIR), VIT-AP University, for
   her invaluable guidance and insightful discussions that significantly
   contributed to this work.

   We also acknowledge Indominus Labs Private Limited and Digital
   Fortress Private Limited for their generous support, which played a
   crucial role in the successful execution of this research.

Authors' Addresses

   Aditya Mitra
   VIT-AP University
   Email: adityamitra5102@gmail.com





Mitra, et al.            Expires 4 October 2025                [Page 16]

Internet-Draft               ml-dsa-webauthn                  April 2025


   Sibi S. Chakkaravarthy
   VIT-AP University
   Email: chakkaravarthy.sibi@vitap.ac.in


   Anisha Ghosh
   VIT-AP University
   Email: ghoshanisha2002@gmail.com


   Devi Priya VS
   VIT-AP University
   Email: priya.21phd7042@vitap.ac.in






































Mitra, et al.            Expires 4 October 2025                [Page 17]