ML-DSA is the default choice. If you want to meet the 2030–2035 timelines recommended/required by governments, the only safe options are ML-DSA, SLH-DSA, XMSS, and LMS. The various ramp-on signature proposals should be viewed as future optimisations. The backup
is simply to continue use ML-DSA and SLH-DSA. This aligns with Bas’s statement: “We use ML-DSA-44 as the baseline, as that’s the scheme that’s going to see the most widespread use initially.”
For non-constrained environments such as the Web, ML-DSA and SLH-DSA are viable, though their size and performance may cause issues. The situation becomes much more challenging in very constrained IoT radio systems, where today’s (ephemeral-ephemeral, ephemeral-static,
and static-static) ECDHE and ECDSA work well, but ML-KEM and ML-DSA are simply too large to be used at all. Disallowing ECC without standardizing viable replacements likely lead to use of more symmetric group keys.
Cheers,
John Preuß Mattsson