Dear all,
First, we would like to sincerely thank Hung Le, Maxime Bros, Jacob Lichtinger, Brice Minaud, Ray Perlner, Daniel Smith-Tone, and Cristian Valenzuela for their thorough and careful security analys
is. While it may appear that SNOVA is in trouble as a result of their analysis, we believe that with some parameter changes the security of SNOVA can be fully restored.
1. On the wedge attack
Regarding the wedge attack we consider SNOVA to behave similarly to other members of the UOV fa
mily. This we already stated at the 6th NIST PQC Standardization Conference and we believe that this continues to be the case. In fact, we agree with their results. We have independently conducted a similar analysis and reached consistent conclusions. Please see our report at:
https://eprint.iacr.org/2026/260. For the affected parameter sets, resistance against the wedge attack can be achieved by slightly increasing the number of vinegar variables. We are pleased that both analyses lead to the same outcome. Compared to the situation at the NIST conference, nothing fundamental has changed. On the contrary, now that we are able to precisely estimate the dimension of the wedge map, we are in a better position to adjust parameters and to propose finely tuned parameter sets that satisfy the claimed security levels against all known attacks.
We also thank the authors for introducing the unbalanced projection-down technique. For completeness and ease of reference, we will include the relevant details and illustrative parameter adjustments (with increased vinegar variables) in the update of our ePrint report. We will also continue updating our draft specification on GitHub and the corresponding software implementation:
https://github.com/PQCLAB-SNOVA/SNOVA.
It is worth noting that our main parameter set with ( l = 4 ) remains secure against the all considered attacks. Due to its balanced trade-off between key size and performance, it continues to be our preferred parameter choice. This remains unchanged since the 6th NIST PQC Standardization Conference.
2. On the new attack by Furue and Ikematsu
We have also taken note of the new attack proposed by Hiroki Furue and Yasuhiko Ikematsu:
https://eprint.iacr.org/2026/298.pdf. It is worth emphasizing that this attack also impacts the security of UOV.
Before proposing new parameter sets, we believe that further cryptanalysis is necessary on the approach taken by Furue et al. Such analysis will help us derive parameter choices that are both better justified and practically meaningful. We are currently conducting a more detailed and comprehensive investigation of possible parameter adjustments.
3. Ongoing directions
In addition to closing the previously existing gap in the wedge attack analysis, we are also shifting part of our research focus toward SNOVA over odd characteristic fields. In particular, we are considering proposals in odd characteristic and exploring more flexible structural variants. See our github repository for the current results from this research.
Overall, we sincerely appreciate all analyses of SNOVA, as they allow us to scrutinize its security more carefully and optimize our parameters sets accordingly. We do not believe that the wedge attack poses a devastating threat to SNOVA but we will update our proposed parameters as a result of its discovery. We already have promising candidates for parameter adjustments. However, at this stage, we believe that more comprehensive and systematic analysis is essential in order to derive optimal parameter sets.
We will continue our investigations and report further results in forthcoming papers.
All the best,
SNOVA Team