Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha256; boundary="B_3743174942_2275403295" --B_3743174942_2275403295 Content-type: multipart/alternative; boundary="B_3743174942_2112291813" --B_3743174942_2112291813 Content-type: text/plain; charset="UTF-8" Content-transfer-encoding: quoted-printable > I think it's clearer to look at what NSA posts online (and > which was the basis for the talk) >=20 > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0[from NSA FAQ]=C2=A0 The intention is= to update CNSA to remove > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0quantum-vulnerable algorithms and rep= lace them with a subset >=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 of the quantum-resistant algorithms s= elected by NIST .=C2=A0 .=C2=A0 . >=20 > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0[..] CNSSP-15 will be updated with a = timeline for required >=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 use of the post-quantum algorithms an= d disuse of the >=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 quantum-vulnerable portion of the cur= rent CNSA Suite >=20 > both sound like a swap, not like an overlapping period. =20 Of course! What else is news?=20 =20 NSA controls CNSA (the suite that you don=E2=80=99t have to use, BTW), and = they=20 explicitly stated (more than once) that hybrids aren=E2=80=99t in their pla= ns. =20 =20 I think the following is the succinct summary of this long exchange: =20 >=C2=A0=C2=A0 .=C2=A0 .=C2=A0=C2=A0 .=C2=A0 The NSA speaker . . . made a po= int against >=C2=A0=C2=A0 hybrids =C2=A0.=C2=A0 .=C2=A0 . >=20 >=C2=A0=C2=A0 I see this as a strong argument for NIST to include hybrids i= n the >=C2=A0=C2=A0 standards. =20 I see this as a strong argument that=20 NIST should standardize good algorithms,=20 NSA should choose what they think best for protecting US National Security = Systems, and We (the community, mostly IETF =E2=80=93 as that=E2=80=99s where my experie= nce is) should use whatever in whatever combination that cryptographers con= sider strong, most likely from the NIST standards. =20 So, if you want to see protocols include hybrid =E2=80=93 then IETF, and no= t NIST, is where it=E2=80=99s being discussed.=20 You might be happy to learn that the majority at IETF leans that way =E2=80= =93 to use NIST algorithms in a hybrid protocol. =20 =20 Now, a funny bit. I was against hybrid, and did not plan to use it. Now my = design uses hybrid protocol. For reasons that have nothing to do with secur= ity of PQ KEMs.=20 =20 =20 =20 =20 =C2=A0=C2=A0=C2=A0 On Wed, Aug 10, 2022 at 08:56:09PM +0000, Blumenthal, Ur= i - 0553 - MITLL wrote: =C2=A0=C2=A0=C2=A0 > > > A colleague told me that she questioned this, and = the clarification =C2=A0=C2=A0=C2=A0 > > > was that they "don't plan to REQUIRE hybrids". =C2=A0=C2=A0=C2=A0 > > =C2=A0=C2=A0=C2=A0 > > That's not a clarification; it's a secondhand rumor = that's completely =C2=A0=C2=A0=C2=A0 > > inconsistent with what the NSA slide =C2=A0=C2=A0=C2=A0 > > https://web.archive.org/web/20220524232249/https://t= witter.com/mjos_crypto/status/1433443198534361101/photo/1=20 =C2=A0=C2=A0=C2=A0=C2=A0>=20 =C2=A0=C2=A0=C2=A0=C2=A0> I'm not arguing - I'm simply sharing what I was t= old when I asked, because that slide surprised me too. =C2=A0=C2=A0=C2=A0 >=20 =C2=A0=C2=A0=C2=A0=C2=A0> Of course, in any case, it would only apply and m= atter to those who seek NSA approval or certification of their products, wh= ich in turn is only relevant to stuff that protects Classified data (for Do= D and such). =C2=A0=C2=A0=C2=A0 >=20 =C2=A0=C2=A0=C2=A0=C2=A0> > Even if there's enough pressure at some =C2=A0=C2=A0=C2=A0 > > point to force NSA to publicly switch to allowing hy= brids, vendors have =C2=A0=C2=A0=C2=A0 > > already received the memo that NSA doesn't want hybr= ids. (The slide was =C2=A0=C2=A0=C2=A0 > > presented at the International Cryptographic Module = Conference.) =C2=A0=C2=A0=C2=A0 >=20 =C2=A0=C2=A0=C2=A0=C2=A0> If what I've been told is correct - and I've no r= eason to assume otherwise - hybrids *can* be approved by NSA, i.e., already= *are* allowed, just not "encouraged". I understand that me sharing what I'= ve heard may not be sufficient - is there a way to get an official answer f= rom NSA on this? =C2=A0=C2=A0=C2=A0 >=20 =C2=A0=C2=A0=C2=A0=C2=A0> But, frankly, I don't see why vendors would imple= ment hybrid in the first place in the products that require NSA approval, i= f NSA doesn't require it. And the fact that NSA does not like hybrids and w= on't require them is incontestable (unless they change their opinion in the= future, which I doubt). =C2=A0=C2=A0=C2=A0 >=20 =C2=A0=C2=A0=C2=A0=C2=A0> > In this environment, it's critical to know whet= her NIST's post-quantum =C2=A0=C2=A0=C2=A0 > > standards will require hybrids. =C2=A0=C2=A0=C2=A0 >=20 =C2=A0=C2=A0=C2=A0=C2=A0> I think NIST standards are orthogonal to use of h= ybrids, and it won't make any sense for NIST to require them. NIST standard= izes KEMs. You want to combine/concatenate several of the standardized KEMs= , and maybe add ECC and/or RSA to the mix? Fine, just don't try to force me= to do the same. =C2=A0=C2=A0=C2=A0 >=20 =C2=A0=C2=A0=C2=A0=C2=A0>=20 =C2=A0=C2=A0=C2=A0=C2=A0> > > > NSA has direct control over large volumes o= f U.S. government purchasing =C2=A0=C2=A0=C2=A0 > > > Not in the non-military/non-DoD, AFAIK. =C2=A0=C2=A0=C2=A0 > > =C2=A0=C2=A0=C2=A0 > > https://en.wikipedia.org/wiki/Military_budget_of_the= _United_States says =C2=A0=C2=A0=C2=A0 > > "the FY2023 defense budget request will exceed $773 = billion". =C2=A0=C2=A0=C2=A0 >=20 =C2=A0=C2=A0=C2=A0=C2=A0> DoD used to be the biggest and the most influenti= al customer of companies like Microsoft. It does not seem to be so anymore.= I assume NSA would be in the same category. And, as you know, US governmen= t is a lot more than DoD. =20 --=20 You received this message because you are subscribed to the Google Groups "= pqc-forum" group. To unsubscribe from this group and stop receiving emails from it, send an e= mail to pqc-forum+unsubscribe@list.nist.gov. To view this discussion on the web visit https://groups.google.com/a/list.n= ist.gov/d/msgid/pqc-forum/29C85CB2-271E-4B8A-BC52-C8ED2B95C7EC%40ll.mit.edu= . --B_3743174942_2112291813 Content-type: text/html; charset="UTF-8" Content-transfer-encoding: quoted-printable

> I think it's clearer to look at what NSA posts online (and

> which was the basis for the talk)

> 

> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0[from NSA FAQ]=C2=A0 The int= ention is to update CNSA to remove

&g= t; =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0quantum-vulnerable algorithms and re= place them with a subset

>=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 of the quantum-resistant algorithms selected= by NIST .=C2=A0 .=C2=A0 .

>&= nbsp;

> =C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0[..] CNSSP-15 will be updated with = a timeline for required

>=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0 use of the post-quantum algorithms and disuse o= f the

>=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 quantum-vulnerable portion of the current CNSA Suite

> 

= > both sound like a swap, not like an overlapping period.

=

 

Of course! What el= se is news?

 

NSA controls CNSA (the suite that you don=E2=80=99t have t= o use, BTW), and they

explicitly s= tated (more than once) that hybrids aren=E2=80=99t in their plans.

 

 

I think the following is the succinct summary of this long ex= change:

 

>=C2=A0=C2=A0 = .=C2=A0 .=C2=A0=C2=A0 .=C2=A0 The NSA speaker . . . made a point against

>=C2=A0=C2=A0 hybrids =C2=A0.=C2=A0 = .=C2=A0 .

> 

>=C2=A0=C2=A0 I= see this as a strong argument for NIST to include hybrids in the

>=C2=A0=C2=A0 standards.

 

I see this= as a strong argument that

 = ;

So, if you want to see protocols = include hybrid =E2=80=93 then IETF, and not NIST, is where it=E2=80=99s bei= ng discussed.

You might be happy to = learn that the majority at IETF leans that way =E2=80=93 to use NIST alg= orithms in a hybrid protocol.

 

 

Now, a funny bit. I was against hybrid, and did n= ot plan to use it. Now my design uses hybrid protocol. For reasons t= hat have nothing to do with security of PQ KEMs.

 

 = ;

 

 

=C2=A0=C2=A0=C2=A0 On Wed= , Aug 10, 2022 at 08:56:09PM +0000, Blumenthal, Uri - 0553 - MITLL wrote:

=C2=A0=C2=A0=C2=A0 > > > A co= lleague told me that she questioned this, and the clarification<= /p>

=C2=A0=C2=A0=C2=A0 > > > was that they = "don't plan to REQUIRE hybrids".

=C2=A0=C2=A0=C2=A0 > >

= =C2=A0=C2=A0=C2=A0 > > That's not a clarification; it's a secondhand = rumor that's completely

=C2=A0=C2=A0= =C2=A0 > > inconsistent with what the NSA slide

=C2=A0=C2=A0=C2=A0 > > https://web.archive.org/web/2= 0220524232249/https://twitter.com/mjos_crypto/status/1433443198534361101/ph= oto/1

=C2=A0=C2=A0=C2=A0=C2=A0> <= o:p>

=C2=A0=C2=A0=C2=A0=C2=A0> I'm not = arguing - I'm simply sharing what I was told when I asked, because that sli= de surprised me too.

=C2=A0=C2=A0=C2= =A0 >

=C2=A0=C2=A0=C2=A0=C2=A0>= ; Of course, in any case, it would only apply and matter to those who seek = NSA approval or certification of their products, which in turn is only rele= vant to stuff that protects Classified data (for DoD and such).<= /p>

=C2=A0=C2=A0=C2=A0 >

=C2=A0=C2=A0=C2=A0=C2=A0> > Even if there's enough pr= essure at some

=C2=A0=C2=A0=C2=A0 >= ; > point to force NSA to publicly switch to allowing hybrids, vendors h= ave

=C2=A0=C2=A0=C2=A0 > > alre= ady received the memo that NSA doesn't want hybrids. (The slide was

=C2=A0=C2=A0=C2=A0 > > presented at th= e International Cryptographic Module Conference.)

=C2=A0=C2=A0=C2=A0 >

=C2=A0=C2=A0=C2=A0=C2=A0> If what I've been told is correct - and I've = no reason to assume otherwise - hybrids *can* be approved by NSA, i.e., alr= eady *are* allowed, just not "encouraged". I understand that me s= haring what I've heard may not be sufficient - is there a way to get an off= icial answer from NSA on this?

=C2=A0= =C2=A0=C2=A0 >

=C2=A0=C2=A0=C2=A0= =C2=A0> But, frankly, I don't see why vendors would implement hybrid in = the first place in the products that require NSA approval, if NSA doesn't r= equire it. And the fact that NSA does not like hybrids and won't require th= em is incontestable (unless they change their opinion in the future, which = I doubt).

=C2=A0=C2=A0=C2=A0 >

=C2=A0=C2=A0=C2=A0=C2=A0> > In th= is environment, it's critical to know whether NIST's post-quantum

=C2=A0=C2=A0=C2=A0 > > standards will re= quire hybrids.

=C2=A0=C2=A0=C2=A0 >= ;

=C2=A0=C2=A0=C2=A0=C2=A0> I thi= nk NIST standards are orthogonal to use of hybrids, and it won't make any s= ense for NIST to require them. NIST standardizes KEMs. You want to combine/= concatenate several of the standardized KEMs, and maybe add ECC and/or RSA = to the mix? Fine, just don't try to force me to do the same.

=

=C2=A0=C2=A0=C2=A0 >

=C2=A0=C2=A0=C2=A0=C2=A0>

=C2=A0=C2=A0=C2=A0=C2=A0> > > > NSA has direct control ove= r large volumes of U.S. government purchasing

=C2=A0=C2=A0=C2=A0 > > > Not in the non-military/non-DoD,= AFAIK.

=C2=A0=C2=A0=C2=A0 > ><= o:p>

=C2=A0=C2=A0=C2=A0 > > https://= en.wikipedia.org/wiki/Military_budget_of_the_United_States says<= /p>

=C2=A0=C2=A0=C2=A0 > > "the FY2023 de= fense budget request will exceed $773 billion".

=C2=A0=C2=A0=C2=A0 >

=C2=A0=C2=A0=C2=A0=C2=A0> DoD used to be the biggest and the most in= fluential customer of companies like Microsoft. It does not seem to be so a= nymore. I assume NSA would be in the same category. And, as you know, US go= vernment is a lot more than DoD.

 

--
You received this message because you are subscribed to the Google Groups &= quot;pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an e= mail to pqc-forum+un= subscribe@list.nist.gov.
To view this discussion on the web visit https://groups.google.c= om/a/list.nist.gov/d/msgid/pqc-forum/29C85CB2-271E-4B8A-BC52-C8ED2B95C7EC%4= 0ll.mit.edu.
--B_3743174942_2112291813-- --B_3743174942_2275403295 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIIUfQYJKoZIhvcNAQcCoIIUbjCCFGoCAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0B BwGgghJDMIIE8zCCA9ugAwIBAgITWQAE/KGDHCQY5NLn7AAAAAT8oTANBgkqhkiG9w0BAQsF ADBRMQswCQYDVQQGEwJVUzEfMB0GA1UECgwWTUlUIExpbmNvbG4gTGFib3JhdG9yeTEMMAoG A1UECwwDUEtJMRMwEQYDVQQDDApNSVRMTCBDQS01MB4XDTIwMTIxMTAwMDQ0OVoXDTI1MTIx MDAwMDQ0OVowYTELMAkGA1UEBhMCVVMxHzAdBgNVBAoTFk1JVCBMaW5jb2xuIExhYm9yYXRv cnkxDzANBgNVBAsTBlBlb3BsZTEgMB4GA1UEAxMXQmx1bWVudGhhbC5VcmkuNTAwMTA1ODQw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCKE/w5SMRbjqdnzi3xm35MTfqSl/hP NjMbDakZIdbjOM3UKEmPFXc6a6VU/QqOJUi6ndjw0tH7RCVP73bdRPXO/E8WiAaaSYG6Ddqr 02Pv6wThtFuh+ll9IbDRWZCrXdglHg5CdvqpmlsX5UY54/Gb5r+Je3CwHewClS9/KqklAu/M Rj7Cc7g+PM9GcvU63WDVgXiuAplgvA+W5Hvmcnseb97nBuBnZ1kgbFScRNLR8y5QxSrSpXxW YRiH8dlr/LfBSYsgClZ57NhMk6Z4YL3y1Pw6Vq8pXtM7hlSq8/6s/jhxwf6vUDDeBAkoEWxl hqJtjdD+qrucwiRcrt9SNOufAgMBAAGjggGyMIIBrjAdBgNVHQ4EFgQURapIqD1qtfvgIhzU 5deTdhe9DyMwDgYDVR0PAQH/BAQDAgbAMB8GA1UdIwQYMBaAFC/vu8YNHbvpav6sZ/MHOwh2 9ktZMDMGA1UdHwQsMCowKKAmoCSGImh0dHA6Ly9jcmwubGwubWl0LmVkdS9nZXRjcmwvbGxj YTUwZgYIKwYBBQUHAQEEWjBYMC0GCCsGAQUFBzAChiFodHRwOi8vY3JsLmxsLm1pdC5lZHUv Z2V0dG8vbGxjYTUwJwYIKwYBBQUHMAGGG2h0dHA6Ly9vY3NwLmxsLm1pdC5lZHUvb2NzcDA9 BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiDg+Udh+ynZoathxWD6vBFhbahHx2Fy94yh/+K cwIBZAIBCjAiBgNVHSUBAf8EGDAWBggrBgEFBQcDBAYKKwYBBAGCNwoDDDAZBgNVHREEEjAQ gQ51cmlAbGwubWl0LmVkdTAYBgNVHSAEETAPMA0GCyqGSIb3EgIBAwEIMCcGCSsGAQQBgjcU AgQaHhgATABMAFUAcwBlAHIAUwBpAGcALQBTAFcwDQYJKoZIhvcNAQELBQADggEBABAw2S9N p+Aii+rVwD0uTZSRjpL7QD9sWkH1WB1Yd/88m+R6xZtKiD1PJLKXzcumU1V9FAPYZufhCcPV KRgyGbizPBn+f3t13bDieGHLd0DWM4abQiEgiFDsUDzTJ78WwHt/PFMjFe/oFSgghgKcOiBO QdxA7oWgV0cvJmc0hNxV6aPACboXW4qAXKMaMXPrhAXJTkL81uoemEf54gdROFIdVLYOUdba mGmstwRcTn1RsJhIcu2EDSNpyfwfK1NUNQAe199BaNenGrKW9yTHwEY55c9xusIEEaW+FLAi jseXn2gIvlQ0W2P2NMm7YCir0F6PI3DDH8+XmfcrbSfNt9swggTAMIIDqKADAgECAgEGMA0G CSqGSIb3DQEBCwUAMFYxCzAJBgNVBAYTAlVTMR8wHQYDVQQKExZNSVQgTGluY29sbiBMYWJv cmF0b3J5MQwwCgYDVQQLEwNQS0kxGDAWBgNVBAMTD01JVExMIFJvb3QgQ0EtMjAeFw0xNzAz MDIxMjAwMDBaFw0yNjAzMDIyMzU5NTlaMFExCzAJBgNVBAYTAlVTMR8wHQYDVQQKDBZNSVQg TGluY29sbiBMYWJvcmF0b3J5MQwwCgYDVQQLDANQS0kxEzARBgNVBAMMCk1JVExMIENBLTUw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCnmoMOvTkfw7nq19mrWazGaa+Q83Uv 0+ATXT3q6kr+WExIMIZ87C74WCcRXpvO7uvx7HvMsYWAFHW93wQwhjytxHIOZgKNJ4VnGVDU l+KI7g0n9+Zjt3hB3HhHbcvbe9+Y4jz+XzCiLl2OaYvICKbxvbBSCLtPEeZQ6x6Tb6EK0ym0 gvYeHO3kuuY+SJHJMltbrLnIVLxjZrNVS77zXKvu6Q3hSdkRIB7kJgEXfL+p/z/2p94bEEZ2 TnQz0TkOjG+Jq7UlXlFRtvsYcDPEQD3UNkZsWcXgC1hXG8TGknUcAhlGxVhlKlFLmNd7342s eGy2s9YxNDnSE+eXTtb0I5LLAgMBAAGjggGcMIIBmDASBgNVHRMBAf8ECDAGAQH/AgEAMB0G A1UdDgQWBBQv77vGDR276Wr+rGfzBzsIdvZLWTAfBgNVHSMEGDAWgBT/ycllTFOA8akMPCGu girH7vgy+zAOBgNVHQ8BAf8EBAMCAYYwZwYIKwYBBQUHAQEEWzBZMC4GCCsGAQUFBzAChiJo dHRwOi8vY3JsLmxsLm1pdC5lZHUvZ2V0dG8vTExSQ0EyMCcGCCsGAQUFBzABhhtodHRwOi8v b2NzcC5sbC5taXQuZWR1L29jc3AwNAYDVR0fBC0wKzApoCegJYYjaHR0cDovL2NybC5sbC5t aXQuZWR1L2dldGNybC9MTFJDQTIwgZIGA1UdIASBijCBhzANBgsqhkiG9xICAQMBBjANBgsq hkiG9xICAQMBCDANBgsqhkiG9xICAQMBBzANBgsqhkiG9xICAQMBCTANBgsqhkiG9xICAQMB CjANBgsqhkiG9xICAQMBCzANBgsqhkiG9xICAQMBDjANBgsqhkiG9xICAQMBDzANBgsqhkiG 9xICAQMBEDANBgkqhkiG9w0BAQsFAAOCAQEAMJYRwLPJ91K7e2mA2Nj10W0o5JMHYkaa+ctL 8/xY8QzIHFI5Ij+iydpPN9KCYn/4Sy80T3aNoYkFlS0GRQXhf0nsiY7TWJwAKw4AiO/yJ37/ oRKRgtyRicvaJ6RjlHCXBOalFLw9UtpodP4/idC51lxzsolaQZraBjVe7PL95PhS7D+22Nff InzLdIb1DBf54NwOVfPIgABtxH1fhZrja7EhR9RoUw5E1O6iWaAuP/xWhSTQFWlhyA0/kkIi 9/HXaY0hYnhcjcbPPqjpyfIhSFjjXhjqK7t2wPrSrBFLFUbnLiNlgQHrvNYF5IqgIfnSBWIr m3rfLhpZZJ/xJ7Yf6DCCA4owggJyoAMCAQICAQEwDQYJKoZIhvcNAQELBQAwVjELMAkGA1UE BhMCVVMxHzAdBgNVBAoTFk1JVCBMaW5jb2xuIExhYm9yYXRvcnkxDDAKBgNVBAsTA1BLSTEY MBYGA1UEAxMPTUlUTEwgUm9vdCBDQS0yMB4XDTE2MDQyMDEyMDAwMFoXDTM1MDQxOTIzNTk1 OVowVjELMAkGA1UEBhMCVVMxHzAdBgNVBAoTFk1JVCBMaW5jb2xuIExhYm9yYXRvcnkxDDAK BgNVBAsTA1BLSTEYMBYGA1UEAxMPTUlUTEwgUm9vdCBDQS0yMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAv3WoBEGOOJtm4ucvaf6vKIFPs8watCd6Smwq/XeRNo7P3jPIxNPw F398RGDUmPJIXA7idzD6j0opFIW+kLqYye9e788PV0dqaJlX8818fNDbSE+8B6hieqKTR7Vf OI74UVQEUKVRFuRFw6uVYuvgew2Tj/C2dEee37eruQl5nHkbV2OsWnZ7O+yt+etd6HRcaXLl P9q8WKgA3B7vkOVIMCKoAuaWj+BFq7K+WNkiyi/KdOH9JmOpbyRK4jcA7xbLnF8JFUSNg5c4 Y1BJrFaZtkCeG6Nm9p524GllkRFzPgpj8VicV+AK+9rY07dTx02kYotTnKuy0YxBAwsUXxAQ EwIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBT/ycllTFOA8akMPCGugirH 7vgy+zAfBgNVHSMEGDAWgBT/ycllTFOA8akMPCGugirH7vgy+zAOBgNVHQ8BAf8EBAMCAYYw DQYJKoZIhvcNAQELBQADggEBAHqYfEf/3J5aMKhlYQ0PnUAbMB8jZSr9/HvjfOF00crFUCfS rqG8JQwo+S/iq66gcp62FEgJ0fQkDgVg6m+C2ETo1LoWiSxhYCfcSIQECljlXwR8wFSayF82 2S69IqvHhdq4d58jU6gYi6ssjU4vwsvsVLRJKk/m/Cg/w8gW6YHM5ahBD6/5Ccel2fI7oSms kO991+otrC11YfDwCFvz7Am0r+K9iVhSWta4hmIuV0YBia07eZKSO02LPgQ8YOz3ku0Yt+mh 8VWRKux2CcYjMpk+WDV0BMp75tqb6pqBFkcKvEBXqxg+8+G/umjii4H0c5kvJhaQyykbmOKm xO9IcJIwggT2MIID3qADAgECAhNZAAUW1xDL1n3IkFBHAAAABRbXMA0GCSqGSIb3DQEBCwUA MFExCzAJBgNVBAYTAlVTMR8wHQYDVQQKDBZNSVQgTGluY29sbiBMYWJvcmF0b3J5MQwwCgYD VQQLDANQS0kxEzARBgNVBAMMCk1JVExMIENBLTUwHhcNMjEwNzA2MjM0ODI1WhcNMjYwMzAy MjM1OTU5WjBhMQswCQYDVQQGEwJVUzEfMB0GA1UEChMWTUlUIExpbmNvbG4gTGFib3JhdG9y eTEPMA0GA1UECxMGUGVvcGxlMSAwHgYDVQQDExdCbHVtZW50aGFsLlVyaS41MDAxMDU4NDCC ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALMRXUPN5Fz28jb9GOca2/6HDq5EE4Hu T1enB0TiMEnOTipW88pgPmSZ/AAFyJF7AWX7PYPw94Ed/Bbs7yCCa6WZS7cQzdHOWppx9gRZ AxkR8+TgosxPcHoCMXmI/hXtVdZ7mwZlpBGJvyBe6YRmxOWLl3WiCRi/gBThwEWsiQZOfhEN 7hC2GhgCKetpNlTRPxslLmkStNlnjNAxhet8Vm/KSYJFVPOx3qytdLwnO6sz4AfIJJQkFX26 6oP0F/4bjRGlIZrZpdUPGiydpJl1r5SRcYs1ZE7JHErULWSyiAIzBDHUCTcN2GnFoR+9fz92 q2VIHvNHx7bV1hd0E0zlC9UCAwEAAaOCAbUwggGxMB0GA1UdDgQWBBSQ5IixU+wo9uUYNUB4 G/ea7vuWEjAOBgNVHQ8BAf8EBAMCBSAwHwYDVR0jBBgwFoAUL++7xg0du+lq/qxn8wc7CHb2 S1kwMwYDVR0fBCwwKjAooCagJIYiaHR0cDovL2NybC5sbC5taXQuZWR1L2dldGNybC9sbGNh NTBmBggrBgEFBQcBAQRaMFgwLQYIKwYBBQUHMAKGIWh0dHA6Ly9jcmwubGwubWl0LmVkdS9n ZXR0by9sbGNhNTAnBggrBgEFBQcwAYYbaHR0cDovL29jc3AubGwubWl0LmVkdS9vY3NwMD0G CSsGAQQBgjcVBwQwMC4GJisGAQQBgjcVCIOD5R2H7Kdmhq2HFYPq8EWFtqEfHYXr0HCD6+0g AgFkAgELMCUGA1UdJQQeMBwGBFUdJQAGCCsGAQUFBwMEBgorBgEEAYI3CgMEMBkGA1UdEQQS MBCBDnVyaUBsbC5taXQuZWR1MBgGA1UdIAQRMA8wDQYLKoZIhvcSAgEDAQgwJwYJKwYBBAGC NxQCBBoeGABMAEwAVQBzAGUAcgBFAG4AYwAtAFMAVzANBgkqhkiG9w0BAQsFAAOCAQEAICZO a7qQQMDGZzRUaX+Mm/3meVo0nTEdNby178MGq6uYGUS4keIkljEoI+KiEMbT8rtCOBZwomnO HdJmLuRUEgrVAos27V4yjvoic8QKsz+qEhxslFg/2EYMAbTsyLqg34R+wG5o6K95ohUrgLud fPxAmcLOFBtIZBr/3DUIlzw4xHKiX2ruex7YOrQccgXb2qGtNB7tG6jAaXqFb+NZTJhj+3pd OiZiZanzpZvPLIH6Xe4awqDrok7q9ImwwSSQorNrJxKKtA3vLUW3DGvom3XDiOjDqpzhmqXC u6Wf7JfrSJRaudU2WyvYfPk7NQlkLR/1G6Xz+zKqO/cBt2aNATGCAf4wggH6AgEBMGgwUTEL MAkGA1UEBhMCVVMxHzAdBgNVBAoMFk1JVCBMaW5jb2xuIExhYm9yYXRvcnkxDDAKBgNVBAsM A1BLSTETMBEGA1UEAwwKTUlUTEwgQ0EtNQITWQAE/KGDHCQY5NLn7AAAAAT8oTANBglghkgB ZQMEAgEFAKBpMC8GCSqGSIb3DQEJBDEiBCC5b4RM1q7Suq7JZ8leZwc8bY7VFqjpSrVybszD Mmfo3DAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yMjA4MTIy MjQ5MDJaMA0GCSqGSIb3DQEBAQUABIIBAGD/z+rA8mEdg17CIlXHueku9z97UXiXLeybBcj2 0QeUH6+8FOCKIxqoIkVrpx7FWjyVn8ZiOAVmC2QhTbjUzuxc1WTyM4Z6B5Iz2U2PpdDyXb+j M3GdHZQmjGhlX+m/J71h5IQ2RuwU1T7tNmoqgVnFget5DI4T0crr1aIR5RVjhNBNTS+YFZuE F2qDrcucCAE4ubMw8BAVAAu8G6pzsISzViqrU/e1cWCK+f+60BvglFPsWRCOkTrtPevCwa7r fLtXhEBNKgD2ojIcNXpaPYHnXlM//aWlYMqpT3/CCgc1MH4hq73LobhkaWPzy4EL59wD6DvQ U5QRJqqoszpKXKg= --B_3743174942_2275403295--