Hi,
I analyzed the Round 2
portfolio in the context of the current and planned set of stateless PQC signature schemes, namely SLH‑DSA, additional SLH‑DSA parameter sets, ML‑DSA, and FN‑DSA. The main issue with the set of current algorithms is the large sizes.
I would group the Round 2 candidate algorithms into four broad categories, reflecting their expected role relative to the existing and planned portfolio:
An overview of the algorithms, sizes, and performance are given by
https://blog.cloudflare.com/another-look-at-pq-signatures/
https://pqshield.github.io/nist-sigs-zoo/
Cheers,
John Preuß Mattsson
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/AS5PR07MB105961FC3A547F6DFF9BFACBF8968A%40AS5PR07MB10596.eurprd07.prod.outlook.com.
Code, Symmetric, MPC in-the-head: From a performance and trust perspective, these schemes generally fall between SLH‑DSA and ML‑DSA. Their trust level is high but lower than that of SLH‑DSA. Concerns regarding the use of standalone lattice‑based schemes prior to sufficiently hardened implementations can be mitigated by SLH‑DSA or hybrids, but would not be addressed by less mature code‑based, symmetric, or MPC‑in‑the‑head schemes. Although the standardization of HQC‑KEM was important, it is difficult to identify a really compelling use case for code‑based, symmetric, or MPC‑in‑the‑head signature schemes, particularly given NIST’s plan to standardize additional SLH‑DSA parameter sets. I therefore suggest that NIST explicitly solicit input from the community to identify concrete and practical use cases for these schemes.
Multivariate: The trust in multivariate is lower than in lattice. For protocols that transmit both public keys and signatures, the combined size is comparable to, or larger than, that of FN‑DSA. In contrast, for protocols where public keys are referenced rather than transmitted by value, multivariate schemes offer significant size advantages. If NIST after the last round has sufficient confidence in the security of multivariate schemes, I believe they should be standardized.
Isogeny: Trust is lower than in lattice‑based schemes. However, contrary to a common perception, the attack on SIKE did not invalidate isogeny‑based cryptography as a whole, but rather exploited a specific weakness in SIKE, in a manner analogous to the attack on Rainbow. SQISign offers very attractive public‑key and signature sizes for constrained IoT radio environments. While its performance is relatively slow, this may be acceptable for many use cases, as computation is typically not the most constrained resource. If there is sufficient confidence in the security of isogeny‑based cryptography, I believe that standardization would be welcome, both for NIKE and for signature schemes. That said, isogeny‑based cryptography remains a highly active research area, with significant improvements emerging on a regular basis. This raises the question of whether SQISign, in its current form, is the appropriate algorithm to standardize in 2030.