What version of the draft should we be basing our changes on?  Is it the -19 
version in data tracker?  Or, is it some version that the RFC editor has 
modified?

________________________________
From: rfc-edi...@rfc-editor.org <rfc-edi...@rfc-editor.org>
Sent: Monday, September 15, 2025 10:05 PM
To: Scott Fluhrer (sfluhrer) <sfluh...@cisco.com>; quynh.d...@nist.gov 
<quynh.d...@nist.gov>
Cc: rfc-edi...@rfc-editor.org <rfc-edi...@rfc-editor.org>; i...@irtf.org 
<i...@irtf.org>; smys...@gmail.com <smys...@gmail.com>; 
auth48archive@rfc-editor.org <auth48archive@rfc-editor.org>
Subject: Re: AUTH48: RFC-to-be 9858 <draft-fluhrer-lms-more-parm-sets-19> for 
your review

Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the 
following questions, which are also in the source file.


1) <!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on https://www.rfc-editor.org/search.
-->


2) <!-- [rfced] Please ensure that the guidelines listed in Section 2.1 of
RFC 5743 have been adhered to in this document.  See
https://www.rfc-editor.org/rfc/rfc5743.html#section-2.1.
-->


3) <!-- [rfced] Please clarify "by defining parameter sets by including
additional hash functions" in the first sentence below. Also, would it be
helpful to update "These include hash functions that result" in the
second sentence in one of the following ways? Or is the current correct?

Original:
   This note extends HSS/LMS (RFC 8554) by defining parameter sets by
   including additional hash functions.  These include hash functions
   that result in signatures with significantly smaller size than the
   signatures using the current parameter sets, and should have
   sufficient security.

Perhaps:
   This document extends HSS/LMS (RFC 8554) by defining additional parameter 
sets
   and hash functions. The hash functions
   result in signatures with significantly smaller sizes than the
   signatures using the current parameter sets, and they should have
   sufficient security.

Or:
   This document extends HSS/LMS (RFC 8554) by defining additional parameter 
sets
   and hash functions that
   result in signatures with significantly smaller sizes than the
   signatures using the current parameter sets and they should have
   sufficient security.
-->


4) <!-- [rfced] Please clarify "a set of parameter sets to".

Original:
   What this draft
   explores is a set of parameter sets to the HSS/LMS (RFC8554) stateful
   hash based signature method that reduce the size of the signature
   significantly or rely on a hash function other than SHA-256 (to
   increase cryptodiversity).

Perhaps:
   This document
   explores parameter sets for the HSS/LMS stateful
   hash-based signature method [RFC8554] that reduce the size of the signature
   significantly or rely on a hash function other than SHA-256 (to
   increase cryptodiversity).
-->


5) <!-- [rfced] May we update "that will be used in Section 3 and Section 4" as
follows?

Original:
   This section defines three hash functions that will be used in
   Section 3 and Section 4.

Perhaps:
   This section defines three hash functions that are used with the
   parameter sets defined in Sections 3 and 4.
-->


6) <!-- [rfced] We recommend updating these sentences as follows. Please review
and let us know your thoughts.

Original:
   Here is a table with the Leighton-Micali One-Time Signature (LM-OTS)
   parameters defined that use the above hashes:
   ...
   Here is a table with the Leighton-Micali (LM) parameters defined that
   use SHA-256/192, SHAKE256/256 and SHAKE256/192 hash functions:
   ...
   Here is a table that gives the space used by both the 256 bit
   parameter sets and the 192 bit parameter sets, for a range of
   plausible Winternitz parameters and tree heights:

Perhaps:
   The table below defines the Leighton-Micali One-Time Signature (LM-
   OTS) parameters that use the hashes defined in Section 2:
   ...
   The table below defines the Leighton-Micali (LM) parameters that use
   the SHA-256/192, SHAKE256/256, and SHAKE256/192 hash functions:
   ...
   The table below gives the space used by both the 256-bit
   and 192-bit parameter sets for a range of
   plausible Winternitz parameters and tree heights:
-->


7) <!-- [rfced] How may we revise the parenthetical here to improve clarity?

Current:
   For signature length, both effects are relevant (because the
   signature consists of a series of hashes and each hash is shorter,
   and because we need fewer Winternitz chains, we need fewer hashes in
   each LM-OTS signature).

Perhaps:
   For signature length, both effects are relevant. The first is relevant 
because
   the signature consists of a series of hashes and each hash is shorter. The 
second
   is relevant because when we need fewer Winternitz chains, we need fewer 
hashes in
   each LM-OTS signature.

Or:
   For signature length, both effects are relevant (i.e., because the
   signature consists of a series of hashes and each hash is shorter
   and because we need fewer Winternitz chains and thus fewer hashes in
   each LM-OTS signature).
-->


8) <!-- [rfced] Will readers understand what "reason 2 above" refers to?

Original:
   For SHA-256/192, there is a smaller (circa 20%) reduction in the
   amount of computation required for a signature operation with a 192
   bit hash (for reason 2 listed above).

Perhaps:
   For SHA-256/192, there is a smaller (circa 20%) reduction in the
   amount of computation required for a signature operation with a
   192-bit hash (for effect 2 listed above).

Or:
   For SHA-256/192, there is a smaller (circa 20%) reduction in the
   amount of computation required for a signature operation with a
   192-bit hash (for reason 2 listed in Section 6).
-->


9) <!-- [rfced] Would updating "will need to be performed, performing the
computations on" to "will need to be performed on" make this sentence
easier to follow?

Original:
   For example, if the adversary is
   willing to wait for 2**64 times the time taken by a hash computation
   (which is over 50 years if a Quantum Computer can compute a hash in
   0.1 nsec), this implies that a total of 2**(192-64) = 2**128 hash
   computations will need to be performed, performing the computations
   on 2**64 (18 quintillion) separate Quantum Computers, each of which
   computes 2**64 hash evaluations.

Perhaps:
   For example, if the adversary is
   willing to wait for 2**64 times the time taken by a hash computation
   (which is over 50 years if a quantum computer can compute a hash in
   0.1 nanoseconds), this implies that a total of 2**(192-64) = 2**128 hash
   computations will need to be performed
   on 2**64 (18 quintillion) separate quantum computers, each of which
   computes 2**64 hash evaluations.
-->


10) <!-- [rfced] Should "standard SHA256" here include a hyphen (i.e., "standard
SHA-256")?

Original:
   In addition, to perform a length extension attack on SHA-256/192, the
   attacker has to guess the 64 omitted bits (because the attack
   requires all 256 bits of the hash value); hence that is even less of
   a concern than it is for the standard SHA256.
-->


11) <!-- [rfced] The text after the semicolon is a fragment. How may we update 
to
connect this text to the rest of the sentence?

Original:
   However, if the application needs to
   assume that it is infeasible for the signer to generate such a
   signature, then the security strength assumptions are reduced; 128
   bits for SHAKE256/256 and 96 bits for SHA-256/192 and SHAKE256/192.

Perhaps:
   However, if the application needs to
   assume that it is infeasible for the signer to generate such a
   signature, then the security strength assumptions are reduced to 128
   bits for SHAKE256/256 and 96 bits for SHA-256/192 and SHAKE256/192.

Or:
   However, if the application needs to
   assume that it is infeasible for the signer to generate such a
   signature, then the security strength assumptions are reduced (128
   bits for SHAKE256/256 and 96 bits for SHA-256/192 and SHAKE256/192).
-->


12) <!-- [rfced] Questions about IANA values

a) Should the values in the "id" column in Tables 1 and 2 be updated to
exactly match the values in the "Numeric Identifier" column of the "LM-OTS
Signatures" and "Leighton-Micali Signatures (LMS)" registries in regard to
capitalization and leading zeroes? We understand that these hex values are the
same.

Examples:

"id" column of Table 1:
  0x0005
  0x000a

"Numeric Identifier" column of "LM-OTS Signatures" registry:
  0x00000005
  0x0000000A

Links to registries:
https://www.iana.org/assignments/leighton-micali-signatures/leighton-micali-signatures.xhtml#leighton-micali-signatures-1

https://www.iana.org/assignments/leighton-micali-signatures/leighton-micali-signatures.xhtml#lm-ots-signatures


b) Some of these values also appear in Appendix A but without the "0x"
prefix. Please confirm that this is correct.

Example:

Appendix A:
  0000000a

"Numeric Identifier" column of "LM-OTS Signatures" registry:
  0x0000000A


c) In Appendix A, we believe the names below should be updated as follows to
align with the parameter set names in Tables 1 and 2 (and in the IANA
registries). Please confirm. Note that there are two instances of of each in
Appendix A.

Original:
 LMS type    00000014                         # LMS_SHAKE256_N24_H5
 LMOTS type  00000010                         # LMOTS_SHAKE256_N24_W8
 LMS type    0000000f                         # LMS_SHAKE256_N32_H5
 LMOTS type  0000000c                         # LMOTS_SHAKE256_N32_W8

Perhaps:
 LMS type    00000014                         # LMS_SHAKE_M24_H5
 LMOTS type  00000010                         # LMOTS_SHAKE_N24_W8
 LMS type    0000000f                         # LMS_SHAKE_M32_H5
 LMOTS type  0000000c                         # LMOTS_SHAKE_N32_W8
-->


13) <!-- [rfced] The following reference entries appeared in the Normative
References section but were not cited in the text. We have removed them;
however, if they should be cited in the text, please let us know where to
include them.

[RFC2119]
[RFC3979]
[RFC4879]
[RFC5226]
[RFC8174]
-->


14) <!-- [rfced] FYI - For [Grover96], we found the following URL from the ACM
Digital Library:

https://dl.acm.org/doi/10.1145/237814.237866

We have updated this reference to match the information provided at this
URL. Please let us know if you have any objections.

Current:
   [Grover96] Grover, L., "A fast quantum mechanical algorithm for
              database search", Proceedings of the twenty-eighth annual
              ACM symposium on Theory of Computing (STOC '96), pp.
              212-219, DOI 10.1145/237814.237866, July 1996,
              <https://doi.org/10.1145/237814.237866>.
-->


15) <!-- [rfced] Appendix A

a) Appendix A includes four test cases, not three as indicated in the sentence
below. We updated as follows for accuracy. Please let us know any objections.

Original:
   This section provides three test cases that can be used to verify or
   debug an implementation, one for each hash function.

Updated:
   This appendix provides four test cases that can be used to verify or
   debug an implementation.


b) FYI - Note that we used figure titles to label the test cases for clarity,
even though we see that figure titles were not used in a similar appendix in
RFC 8554. Let us know any concerns.


c) For the ease of the reader, we suggest adding subsections to Appendix A
for each test case. Let us know your thoughts.

Current:
   Appendix A.  Test Cases

Perhaps:
   Appendix A.  Test Cases
     A.1.  Test Case 1
     A.2.  Test Case 2
     A.3.  Test Case 3
     A.4.  Test Case 4

If we update like this, we could also remove "Test Case 1", "Test Case 2",
etc. from the figure titles if you wish.
-->


16) <!-- [rfced] In Section 2.1, we updated <artwork> to <sourcecode
type="test-vectors">. Please let us know any concerns.

Also, please review each artwork element in Appendix A. Should these be tagged
as sourcecode or another element?

If these are updated to sourcecode, please let us know how/if to set the type
attribute. The current list of preferred values for the "type"
attribute for <sourcecode> is available here:

https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types

If this list does not contain an applicable type, then feel free to suggest a
new one.  Also, it is acceptable to leave the "type" attribute not set.
-->


17) <!-- [rfced] Does "**" indicate superscript? Some examples:

2**192
2**96
2**t
2**(192-t)
2**(192/2)

If so, would you like to make use of <sup> for superscript in this document?
As an example, we updated "2**192" in the fourth paragraph of Section 8 to use
<sup>. If this is acceptable, we will update the other instances; if you
choose not to use <sup>, we will revert this change.

Note: In the HTML and PDF, it appears as superscript.  In the text output,
<sup> generates a^b instead of a**b, which was used in the original document.
-->


18) <!-- [rfced] We updated "1k - 4kbytes" and "0.1 nsec" as follows for
clarity. Let us know any concerns.

Original:
   One disadvantage is that the signatures they produce tend
   to be somewhat large (possibly 1k - 4kbytes).
   ...
   (which is over 50 years if a Quantum Computer can compute a hash in
   0.1 nsec)

Updated:
   One disadvantage is that the signatures they produce tend
   to be somewhat large (possibly 1-4 kilobytes).
   ...
   (which is over 50 years, if a quantum computer can compute a hash in
   0.1 nanoseconds)
-->


19) <!-- [rfced] Terminology

a) The first two sentences below use "LM-OTS" and "LM", while the third
sentence uses "LMOTS" and "LMS" when discussing Tables 1 and 2. Please review
and let us know if updates are needed for consistency.

Original:
   Here is a table with the Leighton-Micali One-Time Signature (LM-OTS)
   parameters defined that use the above hashes:
   ...
   Here is a table with the Leighton-Micali (LM) parameters defined that
   use SHA-256/192, SHAKE256/256 SHAKE256/256, and SHAKE256/192 hash functions:
   ...
   To use the additional hash functions within HSS, one would use the
   appropriate LMOTS id from Table 1 and the appropriate LMS id from
   Table 2, ...


b) Please also review the following (which appear in Appendix A) and let us know
if any updates are needed to align with the choice for the question above.

LMS type
LMOTS type
LMOTS signature


c) Please review the the following and let us know if any updates are
needed. These are used in RFC 8445, but we note that there is redundancy with
"signature" when expanded (i.e., "Leighton-Micali Signature signature" and
"Hierarchical Signature System signature").

  LMS signature
  HSS signature
-->


20) <!-- [rfced] Abbreviations:

a) FYI - We have added expansions for the following abbreviation(s)
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

extendable-output function (XOF)


b) How may we expand "IV" in the following? As "Initialization
Vector (IV)"? This the only instance of IV in the document.

Original:
   We use the same IV as the untruncated SHA-256, rather than defining a
   distinct one, so that we can use a standard SHA-256 hash
   implementation without modification.

Perhaps:
   We use the same initialization vector as the untruncated SHA-256,
   rather than defining a
   distinct one, so that we can use a standard SHA-256 hash
   implementation without modification.
-->


21) <!-- [rfced] Please review the "Inclusive Language" portion of the online
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature typically
result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should
still be reviewed as a best practice.
-->


Thank you.

Sarah Tarrant and Rebecca VanRheenen
RFC Production Center



On Sep 15, 2025, at 6:59 PM, rfc-edi...@rfc-editor.org wrote:

*****IMPORTANT*****

Updated 2025/09/15

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and
approved by you and all coauthors, it will be published as an RFC.
If an author is no longer available, there are several remedies
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties
(e.g., Contributors or Working Group) as necessary before providing
your approval.

Planning your review
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

  Please review and resolve any questions raised by the RFC Editor
  that have been included in the XML file as comments marked as
  follows:

  <!-- [rfced] ... -->

  These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors

  Please ensure that you review any changes submitted by your
  coauthors.  We assume that if you do not speak up that you
  agree to changes submitted by your coauthors.

*  Content

  Please review the full content of the document, as this cannot
  change once the RFC is published.  Please pay particular attention to:
  - IANA considerations updates (if applicable)
  - contact information
  - references

*  Copyright notices and legends

  Please review the copyright notice and legends as defined in
  RFC 5378 and the Trust Legal Provisions
  (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

  Please review the markup in the XML file to ensure that elements of
  content are correctly tagged.  For example, ensure that <sourcecode>
  and <artwork> are set correctly.  See details at
  <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

  Please review the PDF, HTML, and TXT files to ensure that the
  formatted output, as generated from the markup in the XML file, is
  reasonable.  Please note that the TXT will have formatting
  limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all
the parties CCed on this message need to see your changes. The parties
include:

  *  your coauthors

  *  rfc-edi...@rfc-editor.org (the RPC team)

  *  other document participants, depending on the stream (e.g.,
     IETF Stream participants are your working group chairs, the
     responsible ADs, and the document shepherd).

  *  auth48archive@rfc-editor.org, which is a new archival mailing list
     to preserve AUTH48 conversations; it is not an active discussion
     list:

    *  More info:
       
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc

    *  The archive itself:
       https://mailarchive.ietf.org/arch/browse/auth48archive/

    *  Note: If only absolutely necessary, you may temporarily opt out
       of the archiving of messages (e.g., to discuss a sensitive matter).
       If needed, please add a note at the top of the message that you
       have dropped the address. When the discussion is concluded,
       auth48archive@rfc-editor.org will be re-added to the CC list and
       its addition will be noted at the top of the message.

You may submit your changes in one of two ways:

An update to the provided XML file
— OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text,
and technical changes.  Information about stream managers can be found in
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files
-----

The files are available here:
  https://www.rfc-editor.org/authors/rfc9858.xml
  https://www.rfc-editor.org/authors/rfc9858.html
  https://www.rfc-editor.org/authors/rfc9858.pdf
  https://www.rfc-editor.org/authors/rfc9858.txt

Diff file of the text:
  https://www.rfc-editor.org/authors/rfc9858-diff.html
  https://www.rfc-editor.org/authors/rfc9858-rfcdiff.html (side by side)

Alt-diff of the text (allows you to more easily view changes
where text has been deleted or moved):
  https://www.rfc-editor.org/authors/rfc9858-alt-diff.html

Diff of the XML:
  https://www.rfc-editor.org/authors/rfc9858-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
  https://www.rfc-editor.org/auth48/rfc9858

Please let us know if you have any questions.

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9858 (draft-fluhrer-lms-more-parm-sets-19)

Title            : Additional Parameter sets for HSS/LMS Hash-Based Signatures
Author(s)        : S. Fluhrer, Q. Dang
WG Chair(s)      :
Area Director(s) :


-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to