Danny,
The NIST PQC team has been working for some time on writing the draft standard for FN-DSA (Falcon), which is slated to be FIPS 206. We have been in close communication with the Falcon submission team throughout the process. We have also posted occasionally on the pqc-forum requesting feedback on various topics related to the standard. See for example:
https://groups.google.com/u/1/a/list.nist.gov/g/pqc-forum/c/Dpr3tnTlKy0/m/WVlp2lNnBAAJ
https://groups.google.com/u/1/a/list.nist.gov/g/pqc-forum/c/Zhwh95D0KII/m/TY50qQo-AgAJ
Regarding your specific questions, our current draft includes tweaks to the Gaussian sampler in Keygen made in consultation with the Falcon team, including an allowance for fixed point arithmetic – it’s not identical to either the original Falcon submission or to HAWK, though. Also, like the Falcon submission document, our draft only allows for randomized signing, not deterministic.
The process has taken some time, as FN-DSA has a very complex implementation, and the PQC team has also been busy with other parts of the PQC project. The draft standard is essentially completed on our end, and we have submitted it up the chain for approval for publication.
Dustin Moody
NIST PQC
Hi Dustin,
Thanks for the status update. I hope that the non–fixed-point arithmetic parts of the FN-DSA draft specification do not require IEEE 754. Besides being paywalled, IEEE 754 is no longer state-of-the-art, as it was in 1985. The Posit Working Group Standard for Posit Arithmetic [1] is clearly superior, and there is ongoing discussion and development around Posit-enabled RISC-V cores. More broadly, I do not believe that a NIST standard should be tied to any specific format for representing real numbers in a computer.
[1] Standard for Posit Arithmetic (2022)
https://posithub.org/docs/posit_standard-2.pdf
Cheers,
John
Hi again,
For FN-DSA (FIPS 206), HQC-KEM (FIPS 207), and future algorithms, I think NIST should allow more time between the initial public draft (IPD) and the final FIPS publication, and consider releasing multiple public drafts. Having only a single draft and publishing the final versions after just a year for FIPS 203–205 felt somewhat rushed. Several major issues, such as private key formats and external hashing, warranted more thorough discussion. In retrospect, if August 2024 was the target deadline, I think NIST should have moved to the IPD phase earlier and allocated less time to the earlier phases. For many industry stakeholders, providing meaningful feedback before the IPD phase is not realistic.
Cheers,
John
Hi Dustin,
Thanks for the status update. I hope that the non–fixed-point arithmetic parts of the FN-DSA draft specification do not require IEEE 754. Besides being paywalled, IEEE 754 is no longer state-of-the-art, as it was in 1985. The Posit Working Group Standard for Posit Arithmetic [1] is clearly superior, and there is ongoing discussion and development around Posit-enabled RISC-V cores. More broadly, I do not believe that a NIST standard should be tied to any specific format for representing real numbers in a computer.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/20250904122106.604008.qmail%40cr.yp.to.
Bernstein wrote:
>Many people have posted copies that are immediately found by search engines
Relying on pirated content is not a solution, it’s part of the problem. Such material often carries malware, and nation-state actors have a well-documented history of exploiting digital distribution channels to deliver tampered files to selected targets. A historical example is Crypto AG, where different customers reportedly received altered manuals depending on whether they were intended targets.
Cheers,
John
From:
pqc-...@list.nist.gov <pqc-...@list.nist.gov> on behalf of Daniel Apon <dapon....@gmail.com>
Date: Friday, 5 September 2025 at 14:07
To: pqc-...@list.nist.gov <pqc-...@list.nist.gov>
Subject: Re: [pqc-forum] Query on progress of FN-DSA.
I generally agree with Danny,
For someone who has not compared the Posit standard to IEEE 754, here are some of the advantages of Posit:
- Higher accuracy for most real-world computations
- Smaller rounding errors in practice
- Much larger dynamic range
- Simpler comparisons, since bitstring ordering matches numerical ordering
- Simpler arithmetic rules (no multiple NaNs, no signed zero, no denormals)
- Favorable trade-off between accuracy, speed, gate count, and energy efficiency.
The simpler arithmetic and simpler comparisons are attractive for cryptographic use, if using real-number arithmetic at all. I don’t think anyone has studied side-channel aspects of Posit in cryptographic contexts.
Cheers,
John
From:
niux_d...@icloud.com <niux_d...@icloud.com>
Date: Tuesday, 9 September 2025 at 11:31
To: John Mattsson <john.m...@ericsson.com>
Cc: pqc-...@list.nist.gov <pqc-...@list.nist.gov>
Subject: Re: [pqc-forum] Query on progress of FN-DSA.
My two cents here:
Make integer/fixed-point arithmetic Gaussian sampler a 'baseline' choice for implementations and specify in sufficient detail for secure and portable implementation.
Then, specify a 'real-number' variant of Gaussian sampler as a 'mainline/high-level' choice - yes, not floating-point, and then specify the requirements for this real-number arithmetic, such as precision and accuracy.
(baseline, mainline, high-level are worded after H.264/AVC profiles to reflect capability of signers)
The requirements for real-number arithmetic should be take into consideration of existing major contenders, such as IEEE-754 basic formats, potential system-specific IEEE-754 arithmetic formats, unum/posits, GMP, and/or other *efficient* floating-point arithmetic.
Emphasis should be placed on "arithmetic" formats and its efficiency. Similar to with ECC, we don't require point arithmetic be done using XY coordinates, homogeneous and Jaccobian are equally valid.
The real-number version should be a QoI issue, but all that make this choice must meet minimal security standard, which ought to be set out in the final publication (if this is a good idea of course).
Thank you for your attention.
DannyNiu/NJF.
All,
NIST seeks to make our cryptographic standards as self-contained contained as possible. We are happy to share that for FIPS 206, the draft standard for FN-DSA (Falcon), we have received permission from IEEE to reprint the needed parts of IEEE 754-2019 that are necessary to implement FN-DSA. That is, FIPS 206 will be fully self-contained with regards to floating point, and one should be able to implement FN-DSA from the specifications provided in FIPS 206, without needing to go to IEEE 754. We are grateful to the IEEE for their collaboration which makes this possible.
Dustin
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+unsubscribe@list.nist.gov.
Highly hypothetical: If FIPS 206 requires floating point DIEL for it to be secure and performant at the same time, we could (potentially!) consider a new crypto extension that grants it for a tiny subset of scalar and vector floating point arithmetic (basically just add/sub/mul). And even in that case, probably only for well-formed floating point inputs.
Cheers,-markku
On Sep 10, 2025, at 14:59, 'Sophie Schmieg' via pqc-forum <pqc-...@list.nist.gov> wrote:
This Message Is From an External SenderThis message came from outside the Laboratory.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAEEbLAaOvCkHs8JgrUpYiGehpKwckiZvZ_ye-mYNP-DRj4Z_Sw%40mail.gmail.com.
ZjQcmQRYFpfptBannerEnd
Definitely, but at that point you are no longer talking about Falcon.
I’d rather have a strong and validate-able algorithm/standard, than try to preserve the minutia of Falcon (which, unsurprisingly, did not make it to CNSA-2.0, probably because of implementation validation concerns).
I'm just pointing to the specific, very difficult to implement in constant time, algorithms that are used in the spec. As far as I recall, div and exp are the two gnarliest ones, I think everything else like add/sub/mul is not usually implemented via a converging series, but can be computed directly.
Oh yes, understood totally.
My current preference, at least where my opinion matters, is to not use Falcon. But if I have to (and I can't rule it out, given that it will be a FIPS approved algorithm), I'd rather have options to do it safely, and I trust Markku a lot more than myself when it comes to hardware constant time floating point operations.
I’m with you, trusting Markku. But, IMHO, unless Falcon dumps the FP part (and I for one don’t care if it would still be “the Falcon”), it won’t be used, despite being one of the NIST/FIPS standards. People who wrote CNSA probably aren’t the only ones who noticed the validation difficulties.
Thanks!
I’m with you, trusting Markku. But, IMHO, unless Falcon dumps the FP part (and I for one don’t care if it would still be “the Falcon”), it won’t be used, despite being one of the NIST/FIPS standards. People who wrote CNSA probably aren’t the only ones who noticed the validation difficulties.
I believe the floating point support is used in signature generation as well.
I think so too.
Which is why the only reliable way to deploy Falcon is to limit the field implementations to signature verification only, relegating key and signature generation to the few (well-analyzed) places, such as CAs. Apparently, CNSA authors did not consider such an approach feasible – a pity, because I like Falcon signature sizes a lot more than those of ML-DSA.
Well, maybe HAWK would be added…
AM Sophie Schmieg <ssch...@google.com> wrote:
" Well, maybe HAWK would be added… "
As mathematically awesome as HAWK is, isn't it still an order of magnitude larger than what you *really* want from a PQ-signature size? E.g. Hawk is 555 bytes at Cat 1 (even Falcon is ~666 bytes at Cat 1). Don't you want c*secparam bit-sized signatures, for c in [1, 3] or something?
I checked the NIST page for the 5th PQC conference (cf. https://csrc.nist.gov/Events/2024/fifth-pqc-standardization-conference) because I remembered a talk by Matthias Kannwischer (well, one of his three talks last year), where he sort of made the case on stage that maybe we'd failed as a community in the on-ramp process -- whose purpose was /perhaps/ or /in part/ to provide very small PQ-signatures that were standardizable. Alas, the 'on-demand video' from the event isn't something I can pull up from my local browser it seems..
---
Anyway, hope to see you at https://csrc.nist.gov/Events/2025/sixth-pqc-standardization-conference in 2 weeks with fun things to talk about as a community =)
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/d852924b-7761-42e1-8ddb-bc052a643f48n%40list.nist.gov.