Search
5 results for “signature”
Algorithms
- AlgorithmSLH-DSA
SPHINCS+ / SIGNATURE
Stateless Hash-Based Digital Signature Algorithm standardized in FIPS 205 (August 2024). Based on the SPHINCS+ submission. Security relies solely on hash function properties, providing a conservative alternative to lattice-based schemes. Produces larger signatures but offers a security proof independent of structured mathematical hardness assumptions.
- AlgorithmXMSS
Hash-Based / SIGNATURE
Extended Merkle Signature Scheme (XMSS) is a stateful hash-based signature scheme standardized in IETF RFC 8391 (2018) and approved for US federal use in NIST SP 800-208 (2020). Security depends solely on the security of the underlying hash function — no algebraic hardness assumptions. Stateful: signers must track signature count and never reuse one-time keys. Recommended for firmware signing and environments with low signing volume and careful state management.
- AlgorithmLMS / HSS
Hash-Based / SIGNATURE
Leighton-Micali Hash-Based Signatures (LMS) with Hierarchical Signature Scheme (HSS) is a stateful hash-based signature scheme standardized in IETF RFC 8554 (2019) and approved for US federal use in NIST SP 800-208 (2020). Like XMSS, security relies only on hash function properties. Recommended by NSA CNSA 2.0 and NIST for firmware and software signing in National Security Systems. Stateful — requires strict state management to prevent catastrophic key reuse.
- AlgorithmML-DSA
CRYSTALS-Dilithium / SIGNATURE
Module-Lattice-Based Digital Signature Algorithm standardized in FIPS 204 (August 2024). Based on the CRYSTALS-Dilithium submission. Provides quantum-resistant digital signatures as a replacement for RSA and ECDSA. Offers parameter sets at security levels 2, 3, and 5 corresponding to AES-128, AES-192, and AES-256 equivalent strength.
- AlgorithmFALCON (FN-DSA)
NTRU Lattice / SIGNATURE
Fast-Fourier Lattice-based Compact Signatures over NTRU, standardized as FN-DSA in FIPS 206 (October 2024). Produces significantly smaller signatures and public keys than ML-DSA, making it attractive for bandwidth-constrained environments such as TLS handshakes and embedded systems. Based on NTRU lattices with a discrete Gaussian sampler. Requires careful, constant-time implementation to avoid side-channel vulnerabilities.