Crypto Forum (cfrg) Internet Drafts


      
 CPace,a balanced composable PAKE
 
 draft-irtf-cfrg-cpace-21.txt
 Date: 22/04/2026
 Authors: Michel Abdalla, Bjoern Haase, Julia Hesse
 Working Group: Crypto Forum (cfrg)
This document describes CPace which is a protocol that allows two parties that share a low-entropy secret (password) to derive a strong shared key without disclosing the secret to offline dictionary attacks. The CPace protocol was tailored for constrained devices and can be used on groups of prime- and non-prime order.
 Usage Limits on AEAD Algorithms
 
 draft-irtf-cfrg-aead-limits-11.txt
 Date: 04/12/2025
 Authors: Felix Guenther, Martin Thomson, Christopher Wood
 Working Group: Crypto Forum (cfrg)
An Authenticated Encryption with Associated Data (AEAD) algorithm provides confidentiality and integrity. Excessive use of the same key can give an attacker advantages in breaking these properties. This document provides simple guidance for users of common AEAD functions about how to limit the use of keys in order to bound the advantage given to an attacker. It considers limits in both single- and multi-key settings.
 Verifiable Distributed Aggregation Functions
 
 draft-irtf-cfrg-vdaf-19.txt
 Date: 14/04/2026
 Authors: Richard Barnes, David Cook, Christopher Patton, Phillipp Schoppmann
 Working Group: Crypto Forum (cfrg)
This document describes Verifiable Distributed Aggregation Functions (VDAFs), a family of multi-party protocols for computing aggregate statistics over user measurements. These protocols are designed to ensure that, as long as at least one aggregation server executes the protocol honestly, individual measurements are never seen by any server in the clear. At the same time, VDAFs allow the servers to detect if a malicious or misconfigured client submitted an invalid measurement. Two concrete VDAFs are specified, one for general- purpose aggregation (Prio3) and another for heavy hitters (Poplar1).
 Key Blinding for Signature Schemes
 
 draft-irtf-cfrg-signature-key-blinding-10.txt
 Date: 01/03/2026
 Authors: Frank Denis, Edward Eaton, Tancrede Lepoint, Christopher Wood
 Working Group: Crypto Forum (cfrg)
This document describes extensions to existing digital signature schemes for key blinding. The core property of signing with key blinding is that a blinded public key and all signatures produced using the blinded key pair are independent of the unblinded key pair. Moreover, signatures produced using blinded key pairs are indistinguishable from signatures produced using unblinded key pairs. This functionality has a variety of applications, including Tor onion services and privacy-preserving airdrop for bootstrapping cryptocurrency systems.
 The AEGIS Family of Authenticated Encryption Algorithms
 
 draft-irtf-cfrg-aegis-aead-18.txt
 Date: 05/10/2025
 Authors: Frank Denis, Samuel Lucas
 Working Group: Crypto Forum (cfrg)
This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and AEGIS-256X AES-based authenticated encryption algorithms designed for high-performance applications. The document is a product of the Crypto Forum Research Group (CFRG). It is not an IETF product and is not a standard. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.
 The BBS Signature Scheme
 
 draft-irtf-cfrg-bbs-signatures-10.txt
 Date: 08/01/2026
 Authors: Tobias Looker, Vasilis Kalos, Andrew Whitehead, Mike Lodder
 Working Group: Crypto Forum (cfrg)
This document describes the BBS Signature scheme, a secure, multi- message digital signature protocol, supporting proving knowledge of a signature while selectively disclosing any subset of the signed messages. Concretely, the scheme allows for signing multiple messages whilst producing a single, constant size, digital signature. Additionally, the possessor of a BBS signatures is able to create zero-knowledge, proofs of knowledge of a signature, while selectively disclosing subsets of the signed messages. Being zero-knowledge, the BBS proofs do not reveal any information about the undisclosed messages or the signature itself, while at the same time, guaranteeing the authenticity and integrity of the disclosed messages.
 Deterministic Nonce-less Hybrid Public Key Encryption
 
 draft-irtf-cfrg-dnhpke-08.txt
 Date: 20/04/2026
 Authors: Dan Harkins
 Working Group: Crypto Forum (cfrg)
This document describes enhancements to the Hybrid Public Key Encryption standard published by CFRG. These include use of "compact representation" of relevant public keys, support for key-wrapping, and a way to address the use of HPKE on lossy networks
 Implementation Guidance for the PKCS #1 RSA Cryptography Specification
 
 draft-irtf-cfrg-rsa-guidance-08.txt
 Date: 17/03/2026
 Authors: Alicja Kario
 Working Group: Crypto Forum (cfrg)
This document specifies additions and amendments to RFC 8017. Specifically, it provides guidance to implementers of the standard to protect against side-channel attacks. It also deprecates the RSAES- PKCS-v1_5 encryption scheme, and provides an alternative depadding algorithm that protects against side-channel attacks raising from users of vulnerable APIs. The purpose of this specification is to increase security of RSA implementations. The document is a product of the Crypto Forum Research Group (CFRG).
 Hybrid PQ/T Key Encapsulation Mechanisms
 
 draft-irtf-cfrg-hybrid-kems-10.txt
 Date: 02/03/2026
 Authors: Deirdre Connolly, Richard Barnes, Paul Grubbs
 Working Group: Crypto Forum (cfrg)
This document defines generic constructions for hybrid Key Encapsulation Mechanisms (KEMs) based on combining a post-quantum (PQ) KEM with a traditional cryptographic component. Hybrid KEMs built using these constructions provide strong security properties as long as either of the underlying algorithms are secure.
 Kemeleon Encodings
 
 draft-irtf-cfrg-kemeleon-01.txt
 Date: 16/01/2026
 Authors: Felix Guenther, Douglas Stebila, Shannon Veitch
 Working Group: Crypto Forum (cfrg)
This document specifies Kemeleon encoding algorithms for encoding ML- KEM encapsulation keys and ciphertexts as random bytestrings. Kemeleon encodings provide obfuscation of encapsulation keys and ciphertexts, relying on module LWE assumptions.
 Concrete Hybrid PQ/T Key Encapsulation Mechanisms
 
 draft-irtf-cfrg-concrete-hybrid-kems-03.txt
 Date: 02/03/2026
 Authors: Deirdre Connolly, Richard Barnes
 Working Group: Crypto Forum (cfrg)
PQ/T Hybrid Key Encapsulation Mechanisms (KEMs) combine "post- quantum" cryptographic algorithms, which are safe from attack by a quantum computer, with "traditional" algorithms, which are not. CFRG has developed a general framework for creating hybrid KEMs. In this document, we define concrete instantiations of this framework to illustrate certain properties of the framework and simplify implementors' choices.
 Interactive Sigma Proofs
 
 draft-irtf-cfrg-sigma-protocols-02.txt
 Date: 02/03/2026
 Authors: Michele Orru, Cathie Yun
 Working Group: Crypto Forum (cfrg)
A Sigma Protocol is an interactive zero-knowledge proof of knowledge that allows a prover to convince a verifier of the validity of a statement. It satisfies the properties of completeness, soundness, and zero-knowledge, as described in Section 3. This document describes Sigma Protocols for proving knowledge of pre- images of linear maps in prime-order elliptic curve groups. Examples include zero-knowledge proofs for discrete logarithm relations, ElGamal encryptions, Pedersen commitments, and range proofs.
 Fiat-Shamir Transformation
 
 draft-irtf-cfrg-fiat-shamir-02.txt
 Date: 02/03/2026
 Authors: Michele Orru
 Working Group: Crypto Forum (cfrg)
This document describes how to construct a non-interactive proof via the Fiat–Shamir transformation, using a generic procedure that compiles an interactive proof into a non-interactive one by relying on a stateful duplex sponge object. The duplex sponge interface requires two methods: absorb and squeeze, which respectively read and write elements of a specified base type. The absorb operation incrementally updates the duplex sponge's internal state, while the squeeze operation produces variable-length, unpredictable outputs. This interface can be instantiated with different constructions based on permutation or compression functions. This specification also defines codecs to securely map prover messages into the duplex sponge domain, from the duplex sponge domain into verifier messages. It also establishes how the non-interactive argument string should be serialized.