Search

5 results for signature

Algorithms

  • AlgorithmSLH-DSA

    SPHINCS+ / SIGNATURE

    Stateless Hash-Based Digital Signature Algorithm standardized in FIPS 205 (August 2024). Based on the SPHINCS+ submission. Security relies solely on hash function properties, providing a conservative alternative to lattice-based schemes. Produces larger signatures but offers a security proof independent of structured mathematical hardness assumptions.

  • AlgorithmXMSS

    Hash-Based / SIGNATURE

    Extended Merkle Signature Scheme (XMSS) is a stateful hash-based signature scheme standardized in IETF RFC 8391 (2018) and approved for US federal use in NIST SP 800-208 (2020). Security depends solely on the security of the underlying hash function — no algebraic hardness assumptions. Stateful: signers must track signature count and never reuse one-time keys. Recommended for firmware signing and environments with low signing volume and careful state management.

  • AlgorithmLMS / HSS

    Hash-Based / SIGNATURE

    Leighton-Micali Hash-Based Signatures (LMS) with Hierarchical Signature Scheme (HSS) is a stateful hash-based signature scheme standardized in IETF RFC 8554 (2019) and approved for US federal use in NIST SP 800-208 (2020). Like XMSS, security relies only on hash function properties. Recommended by NSA CNSA 2.0 and NIST for firmware and software signing in National Security Systems. Stateful — requires strict state management to prevent catastrophic key reuse.

  • AlgorithmML-DSA

    CRYSTALS-Dilithium / SIGNATURE

    Module-Lattice-Based Digital Signature Algorithm standardized in FIPS 204 (August 2024). Based on the CRYSTALS-Dilithium submission. Provides quantum-resistant digital signatures as a replacement for RSA and ECDSA. Offers parameter sets at security levels 2, 3, and 5 corresponding to AES-128, AES-192, and AES-256 equivalent strength.

  • NTRU Lattice / SIGNATURE

    Fast-Fourier Lattice-based Compact Signatures over NTRU, standardized as FN-DSA in FIPS 206 (October 2024). Produces significantly smaller signatures and public keys than ML-DSA, making it attractive for bandwidth-constrained environments such as TLS handshakes and embedded systems. Based on NTRU lattices with a discrete Gaussian sampler. Requires careful, constant-time implementation to avoid side-channel vulnerabilities.