Call for comments: ipd SP 800-230: Additional SLH-DSA Parameter Sets for Limited Signature Use Cases

417 views
Skip to first unread message

dustin...@nist.gov

unread,
Apr 13, 2026, 11:22:41 AMApr 13
to pqc-forum
All,

NIST is seeking public comments on the initial public draft (ipd) of Special Publication (SP) 800-230, Additional SLH-DSA Parameter Sets for Limited-Signature Use Cases. This document serves as a technical extension to FIPS 205 by specifying six additional parameter sets for security levels 1, 3, and 5. These variants are specifically tailored for use cases that require fast verification and reduced signature sizes, such as the signing of software, firmware, and digital certificates. These optimizations are achieved by establishing a strict limit of 2^24 signatures per signing key; therefore, these sets are not approved for general-purpose use.

 

NIST requests feedback on the suitability of these additional parameter sets, specifically asking reviewers to identify applications for which these variants might incur unacceptable performance or to suggest alternative sets that are better suited for such use cases. Users must perform a thorough evaluation to ensure that the signature limit is never exceeded during a key's lifetime. Please submit comments to SP800-230...@nist.gov by June 12, 2026.

See: https://csrc.nist.gov/pubs/sp/800/230/ipd


Dustin Moody

NIST PQC

John Mattsson

unread,
May 4, 2026, 4:58:15 PM (9 days ago) May 4
to dustin...@nist.gov, pqc-forum

Thanks Dustin,


We welcome NIST’s plan to standardize additional SLH-DSA parameter sets. A limit of 224 signatures poses no issues for many use cases and will be beneficial in bandwidth- and latency-constrained environments. Please find below our comments on the SP 800-230 IPD, along with more general comments on NIST’s quantum-resistant signatures. The PDF we sent to  SP800-230...@nist.gov can be found here:

https://emanjon.github.io/NIST-comments/2026%20SP%20800-230%20IPD.pdf

 

Specific comments on the draft specification:

  • While we would welcome even more parameter sets [1], we consider it most important that NIST publishes some additional SLH-DSA parameter sets as soon as possible. Any delay beyond August 2024, when FIPS 203–205 were published, significantly limits the range of use cases in which new algorithms can be deployed during the initial PQC migration. PKI and long-lived devices are high priority areas for migration [2], and SP 800-230 is too late for some already migrated systems [3]. The proposed parameter sets provide substantial value across many use cases. We therefore encourage NIST to publish SP 800-230 without further delay, while remaining open to additional parameter sets and refinements, provided they do not postpone publication.

  • "For many use cases of transmitting and verifying the digital signatures of firmware, software, and digital certificates, those signature sizes and/or their associated verification times are highly undesirable." 

    This statement is accurate; however, “highly undesirable” is context-dependent and does not apply universally. For many infrastructure use cases involving TLS and IPsec, the performance of SLH-DSA as specified in FIPS 205 is adequate. We suggest the more precise formulation: “may be highly undesirable in bandwidth- or latency-constrained environments.”
     
  • The draft states that the parameter sets in FIPS 205 are designed to maintain full security for up to 264 signatures. A corresponding statement is missing for the additional parameter sets. We suggest that SP 800-230 explicitly state that the additional SLH-DSA parameter sets maintain full security for up to 224 signatures.
     
  • While the changes in signature size are easy to understand, we suggest that the document also includes a more detailed explanation of how signing and verification performance compares to the already standardized “s” and “f” variants in Table 2 of FIPS 205 [4].

  • The specification clearly explains that users must perform a thorough evaluation to ensure that the signature limit is never exceeded over the lifetime of any signing key. We suggest that the document also explicitly state that no such limits apply to the verification key, as this clarification would likely be helpful to readers.
     
  • While the primary advantage over LMS and XMSS is that SLH-DSA is stateless, the specification should also discuss its advantages relative to ML-DSA and FN-DSA. In particular, the main advantage of SLH-DSA lies in its security assumptions: it relies only on the strength of the underlying hash function, whereas ML-DSA and FN-DSA additionally rely on the hardness of underlying lattice problems.
     
  • We suggest stating explicitly that SLH-DSA shall be instantiated as specified in Section 11.1 of FIPS 205 [4] for the SLH-DSA-SHAKE-128-24, SLH-DSA-SHAKE-192-24, and SLH-DSA-SHAKE-256-24 parameter sets; as specified in Section 11.2.1 for the SLH-DSA-SHA2-128-24 parameter set; and as specified in Section 11.2.2 for the SLH-DSA-SHA2-192-24 and SLH-DSA-SHA2-256-24 parameter sets.
     
  • We suggest expanding Table 1 to include a column for the signature limit and assigning this parameter a variable name. This would facilitate combining parameter sets from FIPS 205 and SP 800-230 into a single table, where inclusion of the signature limit is necessary, and would help establish a consistent term for this parameter.
     
  • “these cached values is permissible and does not affect the security properties of the algorithm”

    The document requires that users perform an evaluation of the operational environment, including the maximum potential speed of each signing operation. As cached values affect the maximum potential speed of each signing operation, it may impact the ability to guarantee the 2²⁴ signature limit. We suggest that this is explicitly noted in the specification.

  • We suggest the document explicitly note that no attacks on strong unforgeability (SUF-CMA) are known for SLH-DSA, and that the scheme is widely believed to provide SUF-CMA security, i.e., given multiple message-signature pairs ( ) an attacker cannot create a new signature ( ) for any previously signed message . Signature schemes with trivial attacks on strong unforgeability are unsuitable for general-purpose use and have resulted in serious practical security vulnerabilities in real-world systems. Many developers and systems treat a message-signature pair as “something the signer actively emitted,” rather than “the signer once signed this message”. This can undermine system integrity, auditability, and provenance, and, in the worst case, may even enable replay attacks. See the general comments on pages 3–4 for a discussion of the importance of phasing out malleable signature schemes with trivial attacks on strong unforgeability.
     
  • We suggest the document explicitly state that SLH-DSA is designed to be robust against multi-key attacks, i.e., attacks on any one of many public-private key pairs.

General comments on NIST’s quantum-resistant signatures:

 

We consider SP 800-227 Recommendations for Key-Encapsulation Mechanisms [5], to be an excellent document, and we believe NIST should develop a similar publication for signature schemes. Modern signature algorithms introduce several new and important characteristics that users should be aware of, and these differences warrant additional guidance from NIST:

  • FIPS 204 and FIPS 205 introduce several concepts that are likely new to many users, such as beyond-unforgeability (BUFF) properties [6–7], the context string , the use of the seed 𝜉 as a private key, hedged and deterministic hashing, pre-hashing via external-𝜇, HashML-DSA and HashSLH-DSA, and protocol-layer pre-hashing where a digest is used as the message  [8]. Future standards such as FN-DSA [9] may explore an expanded feature set, including, for example, key and message recovery, identity-based and blind signatures, threshold and aggregate signatures, and zero-knowledge-friendly constructions. It is preferable to provide guidance on these types of mechanisms in a shared specification, rather than repeating them across FIPS 204, 205, 206, and potential future NIST specifications for signature algorithms such as MAYO, SQIsign, and FAEST.

  • All modern signature schemes (RSA-PSS, EdDSA, LMS, XMSS, ML-DSA, SLH-DSA, FN-DSA) avoid trivial attacks on strong unforgeability and are widely believed to provide a high level of SUF-CMA security [10]. The transition to PQC provides an excellent opportunity to phase out signatures with trivial attacks on strong unforgeability. Malleable EUF-CMA signatures have enabled serious attacks in the past [11] and will likely do so again if they continue to be used. If any future signature schemes are standardized despite known low-complexity attacks against SUF-CMA security, such schemes should be clearly labeled with appropriate warnings and should not be considered general-purpose. 

    Malleable EUF-CMA signatures can undermine system integrity, auditability, and provenance, and, in the worst case, may even enable replay attacks, see [12]. This is also true for certificates. There is a significant gap between what people think a certificate fingerprint represents and what cryptography actually guarantees when a certificate is signed with a malleable EUF-CMA only signature algorithm. With such signature algorithms, a CA does not issue a single certificate; instead, it issues a set of valid certificates, each with its own fingerprint. This mismatch has practical consequences. Logging, SIEM, and threat intelligence systems often record events such as “Observed certificate fingerprint X connecting to service Y,” implicitly treating the fingerprint as a stable identifier. Similarly, some firewall blocklists operate on fingerprints (e.g., “Block fingerprint X”), see e.g., [13], and incident response workflows often rely on fingerprints as unique identifiers when searching for the attacker across datasets. In the presence of only EUF-CMA guarantees, these assumptions break down, as the same underlying certificate can appear under many fingerprints. That is, given a certificate (tbsCertificate, Signature), an attacker can derive one or more additional valid certificates (tbsCertificate, Signature′) that have different fingerprints (tbsCertificate, Signature). Nation-state attackers are known to deliberately confuse logging systems, evade signature-based detection, and introduce ambiguity into forensic analysis, and they can be expected to exploit signature malleability for these purposes as well.

    We believe that standardizing ECDSA with trivial attacks on strong unforgeability was a mistake that should not be repeated. Several widely deployed cryptographic libraries enforce canonical (low- ) ECDSA signatures to eliminate signature malleability. This should be best practice; however, it is not compliant with ECDSA as specified in FIPS 186-5.
     
  • SP 800-227 [5] provides requirements and specifications for hybridizing KEMs. It states that a well-constructed composite KEM should preserve the security properties of its components, which aligns with the European definition [2], where a hybrid is defined as “a combination of a post-quantum algorithm and a quantum-vulnerable algorithm for the same mechanism, such that the security is as high as the stronger of the two components.” While hybridization of signatures is generally not considered necessary, some European agencies require temporary hybridization of ML-DSA and FN-DSA during the post-quantum migration period [14]. As no government requires hybridization of SLH-DSA, it is expected that many global industries will use standalone SLH-DSA. For many infrastructure use cases involving TLS and IPsec, the performance of SLH-DSA is adequate.

    For the limited cases where signature hybridization is used, additional NIST guidance would be valuable. We suggest that NIST recommend avoiding signature hybridization altogether, and clarify that any composite signature construction must preserve the security properties of its components. Composite constructions that do not preserve the security properties of ML-DSA should be disallowed from 2035. For niche use cases where hybridization is necessary and EUF-CMA security can be shown to suffice, it is appropriate to use non-composite hybrid approaches based on two independent signatures, each anchored in a separate certificate chain. This approach is currently the only hybridization method that appears sufficiently mature for medium-term deployment. It also offers a clear operational advantage: it avoids the combinatorial explosion problem inherent in composite constructions, and the traditional component can be cleanly removed once it no longer considered to provide meaningful security, which according to NIST is from 2035.

    Composite public keys and signatures cannot be used for long-lived roots of trust in Europe, where the ECCG ACM [15] only considers cryptographic mechanisms as agreed if their underlying cryptographic primitives are agreed. Consequently, composite signatures will likely be deprecated alongside their quantum-vulnerable components. Some poorly designed composite signature constructions such as [16] not only significantly reduce the security properties of ML‑DSA by inheriting the malleability of ECDSA, but also introduce additional malleability weaknesses. In particular, when hedged or randomized signing is used, an attacker who has observed  valid signatures of a message  can derive up to  distinct new valid signatures for the same message. In practice, repeated signing of the same message  with the same private key  often occur when a signing request is retried after failure or interruption, as well as in high-availability systems where the same message is submitted to multiple HSMs. The composites in [16] also significantly weaken the security of ML-DSA by failing to preserve its beyond-unforgeability (BUFF) properties [6–7]. As shown in [17], existential unforgeability alone does not capture the guarantees required by real-world protocols, and the lack of beyond unforgeability (BUFF) properties in traditional signature schemes has enabled concrete attacks on deployed systems; see [6–7]. We note that there exist signature combiners that preserve both SUF-CMA and BUFF properties [18].

  • Stateful signature schemes are unfamiliar to many users, and both the requirement to maintain strict signing state and the requirement that key generation be performed in an HSMs that do not allow secret keying material to be exported introduce opportunities for users to shoot themselves in the foot. We believe these issues should be more clearly and prominently explained to users, with a general recommendation to use stateless signatures.
     
  • It is currently unclear which security categories NIST assigns to the LMS and XMSS parameter sets defined in SP 800-208 [19]. We believe NIST should publish an updated version of SP 800-208 that clearly specifies the security strength associated with each parameter set.
     
  • Key exchange and digital signatures serve fundamentally different use cases and therefore have different security and operational requirements. Hash-based signature schemes are conservative in their security assumptions, whereas lattice-based schemes introduce newer assumptions and may warrant larger security margins in practice. In many applications, signatures are required to provide integrity protection over shorter time horizons than those needed for confidentiality. Signatures can therefore often tolerate lower security category choices than key establishment mechanisms. For example, CNSA 2.0 [20] requires security category 5 for ML-DSA, while permitting all standardized parameter sets for hash-based signature schemes.
     
  • Due to persistent misconceptions that Grover’s algorithm could be practically used to attack AES-128 and SHA-256, many users remain hesitant to deploy security category 1 and 2 signatures in new systems. The current statements that AES-128 can continue to be used is insufficient for long-term planning. We suggest that NIST and other government agencies, such as the UK NCSC, provide clearer long-term guidance on the expected viability of security category 1, expressed in a time-bound form. For example, a conservative statement such as “security category 1 will remain approved at least until 2060” would provide useful planning guidance for industry while still allowing flexibility for NIST to extend this horizon if advances in classical computing proceed more slowly than currently anticipated.
     

John Preuß Mattsson,

Expert Cryptographic Algorithms and Security Protocols

On behalf of the Ericsson Cryptography Team

References

[1] Ericsson comments on Standardization of Additional SLH-DSA Parameter Sets

https://emanjon.github.io/NIST-comments/2025%20SLH-DSA%20parameters.pdf

 

[2] EU Roadmap for the Transition to Post-Quantum Cryptography

https://ec.europa.eu/newsroom/dae/redirection/document/117507

 

[3] OpenTitan shipping in production

https://opensource.googleblog.com/2026/03/opentitan-shipping-in-production.html

 

[4] FIPS 205, Stateless Hash-Based Digital Signature Standard
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf

 

[5] SP 800-227, Recommendations for Key-Encapsulation Mechanisms
https://csrc.nist.gov/pubs/sp/800/227/final

 

[6] BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures

https://ieeexplore.ieee.org/document/9519420

 

[7] A Framework for Advanced Signature Notions

https://eprint.iacr.org/2025/960.pdf

 

[8] HashML-DSA considered harmful

https://keymaterial.net/2024/11/05/hashml-dsa-considered-harmful/

 

[9] Falcon Specification version 1.2

https://falcon-sign.info/falcon.pdf

 

[10] Digital signature schemes with strong existential unforgeability

https://pmc.ncbi.nlm.nih.gov/articles/PMC9925878/

 

[11] Bitcoin Transaction Malleability and MtGox

https://link.springer.com/chapter/10.1007/978-3-319-11212-1_18

 

[12] OWASP, Signature Malleability
https://scs.owasp.org/SCWE/SCSVS-CRYPTO/SCWE-054/

 

[13] Secure Firewall - Blacklisted SSL Certificate Fingerprint
https://research.splunk.com/network/c43f7b49-2dab-4e76-892e-7f971c2f20f1/

 

[14] ANSSI views on technical aspects of the migration to PQC

https://na.eventscloud.com/file_uploads/b635298de1c10be6d3732863e8b1beca_Day2-1600-ANSSI.pdf

 

[15] ECCG Approved Cryptographic Algorithms 2.0

https://certification.enisa.europa.eu/document/download/a845662b-aee0-484e-9191-890c4cfa7aaa_en

 

[16] Composite ML-DSA for use in X.509 Public Key Infrastructure

https://datatracker.ietf.org/doc/html/draft-ietf-lamps-pq-composite-sigs

 

[17] Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures

https://eprint.iacr.org/2019/779.pdf

 

[18] Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability 

https://eprint.iacr.org/2025/1844.pdf

 

[19] SP 800-208, Recommendation for Stateful Hash-Based Signature Schemes
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf

 

[20] The Commercial National Security Algorithm Suite 2.0 (CNSA 2.0)
https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF

Reply all
Reply to author
Forward
0 new messages