<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-prabel-pquip-pqc-overview-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="PQC Algo Overview">Post-Quantum Algorithms Overview</title>
    <seriesInfo name="Internet-Draft" value="draft-prabel-pquip-pqc-overview-00"/>
    <author initials="L." surname="Prabel" fullname="Lucas Prabel">
      <organization>Huawei</organization>
      <address>
        <email>lucas.prabel@huawei.com</email>
      </address>
    </author>
    <author initials="Y." surname="Shah" fullname="Yug Shah">
      <organization>Qorsa</organization>
      <address>
        <email>yug.shah@qorsa.com</email>
      </address>
    </author>
    <author initials="G." surname="Wang" fullname="Guilin Wang">
      <organization>Huawei</organization>
      <address>
        <email>wang.guilin@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Kanno" fullname="Satoru Kanno">
      <organization>GMO Internet Group</organization>
      <address>
        <email>kanno@gmo-connect.jp</email>
      </address>
    </author>
    <date year="2026" month="March" day="19"/>
    <area>Security</area>
    <workgroup>PQUIP</workgroup>
    <keyword>PQUIP</keyword>
    <keyword>Migration</keyword>
    <keyword>PQC</keyword>
    <keyword>Parameters</keyword>
    <keyword>Algorithms</keyword>
    <abstract>
      <?line 149?>

<t>This document summarizes publicly available information on a range of widely studied post-quantum cryptographic algorithms, including Key Encapsulation Mechanisms (KEMs) and digital signature schemes.</t>
      <t>It aggregates parameters and high-level security assumptions from existing specifications and standardization efforts, serving as a unified informational reference.</t>
      <t>This document is purely informational. It does not provide guidance, recommendations, or requirements regarding algorithm selection, deployment, or migration strategies.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-prabel-pquip-pqc-overview/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Post-Quantum Use In Protocols Working Group mailing list (<eref target="mailto:pqc@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pqc/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lucasprabel/draft-pquip-pqc-overview-00"/>.</t>
    </note>
  </front>
  <middle>
    <?line 157?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The emergence of large-scale quantum computers poses a significant threat to widely deployed asymmetric cryptographic algorithms that rely on integer factorization or discrete logarithms. In response, the cryptographic community has developed post-quantum cryptographic (PQC) algorithms designed to resist attacks from both classical and quantum adversaries.</t>
      <t>Several standardization bodies, including NIST, ISO, and others, have been evaluating and standardizing post-quantum algorithms for key encapsulation mechanisms (KEMs) and digital signature schemes. As these algorithms advance through various standardization processes, implementers and protocol designers need readily accessible reference information about their parameters, security properties, and characteristics.</t>
      <t>This document provides a consolidated overview of widely studied post-quantum cryptographic algorithms, based on publicly available information. It aggregates parameter sizes, security classifications, and underlying hardness assumptions from existing specifications and standardization efforts. The information presented here is purely informational and does not constitute recommendations or requirements for algorithm selection, deployment strategies, or migration planning.</t>
      <t>The document covers both KEM schemes (ML-KEM, HQC, FrodoKEM, NTRU, Classic McEliece) and signature schemes (ML-DSA, FN-DSA, SLH-DSA, LMS, XMSS/XMSS^MT), providing a unified reference to assist stakeholders in navigating the landscape of post-quantum cryptographic algorithms.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This section recalls terminology relevant to post-quantum cryptographic algorithms and defines additional terms used throughout this document.</t>
      <t><em>CRQC</em>: A Cryptographically Relevant Quantum Computer is a quantum 
   computer powerful enough to break traditional asymmetric 
   cryptographic algorithms.</t>
      <t><em>Traditional Asymmetric Cryptographic Algorithm</em>:  An asymmetric
   cryptographic algorithm based on integer factorisation, finite
   field discrete logarithms, elliptic curve discrete logarithms, or
   related mathematical problems. They can also be called classical or
   conventional algorithms.</t>
      <t><em>Post-Quantum Asymmetric Cryptographic Algorithm</em>:  An asymmetric 
cryptographic algorithm whose security is intended to hold against 
attacks using either classical or quantum computational resources.
They can also be called quantum-resistant or quantum-safe algorithms.</t>
      <t>As with all cryptography, it always remains the case that attacks, either quantum or classical, may be found against post-quantum algorithms. Therefore it should not be assumed that just because an algorithm is designed to provide post-quantum security it will not be compromised. Post-Quantum Algorithms are named for their design objective: security against an adversary with access to a CRQC, and this classification will remain should an attack be found against it.</t>
      <t><em>IND-CCA2</em>: Indistinguishability under Adaptive Chosen-Ciphertext Attack. It is the standard security notion for KEM schemes.</t>
      <t><em>EUF-CMA</em>: Existential Unforgeability under Chosen-Message Attack. It is the standard security notion for digital signature schemes.</t>
      <t><em>SUF-CMA</em>: Strong Existential Unforgeability under Chosen-Message Attack. It is a stronger security notion than EUF-CMA.</t>
    </section>
    <section anchor="parameter-sizes">
      <name>Parameter Sizes</name>
      <t>This section is divided into two subsections, one focused on Key Encapsulation Mechanism, and the other on Signature schemes.</t>
      <t>The "claimed security level" in each table refers to the NIST Post-Quantum Cryptography Evaluation Criteria. We summarize this classification in <xref target="tab-security-level"/> below. Additional details are available at <xref target="IR.8547"/>.</t>
      <table anchor="tab-security-level">
        <name>NIST Post-Quantum Cryptography Classification</name>
        <thead>
          <tr>
            <th align="left">Security Category</th>
            <th align="left">Attack Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">Key search on a block cipher with a 128-bit key</td>
            <td align="left">AES-128</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">Collision search on a 256-bit hash function</td>
            <td align="left">SHA-256</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">Key search on a block cipher with a 192-bit key</td>
            <td align="left">AES-192</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">Collision search on a 384-bit hash function</td>
            <td align="left">SHA3-384</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">Key search on a block cipher with a 256-bit key</td>
            <td align="left">AES-256</td>
          </tr>
        </tbody>
      </table>
      <section anchor="key-encapsulation-mechanism-kem-schemes">
        <name>Key Encapsulation Mechanism (KEM) Schemes</name>
        <t>A Key Encapsulation Mechanism (KEM) is a cryptographic primitive that can be used as a building block within a broader key establishment protocol. While KEMs are often employed to achieve the same end goal as a traditional key exchange, they do not, by themselves, define the interactive procedures, message flows, or authentication steps that a full key exchange protocol requires.</t>
        <t>This distinction is particularly relevant for implementers and developers to avoid confusion:</t>
        <ul spacing="normal">
          <li>
            <t>A KEM provides the mechanism for securely deriving and encapsulating a shared secret.</t>
          </li>
          <li>
            <t>A Key Exchange Protocol defines the interaction between parties that uses one or more KEMs (and possibly other primitives) to securely establish a secret key in context.</t>
          </li>
        </ul>
        <section anchor="ml-kem">
          <name>ML-KEM</name>
          <t>ML-KEM is a structured lattice-based KEM and the first post-quantum KEM standardized by NIST. It is derived from the CRYSTALS-Kyber submission to NIST PQC Standardization Project. The security of ML-KEM is based on the computational hardness of the Module Learning with Errors problem.</t>
          <t>NIST recommends security level 3 by default, and European security agencies recommend a minimum of the same security level.</t>
          <t>The NIST specification of ML-KEM is available at <xref target="MLKEM.SPEC"/>.</t>
          <table anchor="tab-mlkem">
            <name>ML-KEM Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ML-KEM-512</td>
                <td align="left">800</td>
                <td align="left">1632</td>
                <td align="left">768</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">ML-KEM-768</td>
                <td align="left">1184</td>
                <td align="left">2400</td>
                <td align="left">1088</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ML-KEM-1024</td>
                <td align="left">1568</td>
                <td align="left">3168</td>
                <td align="left">1568</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
          <t><xref target="MLKEM.SPEC"/> also allows the use of a 64-byte seed to represent the private key.</t>
        </section>
        <section anchor="hqc">
          <name>HQC</name>
          <t>HQC is a code-based KEM relying on the decisional Quasi-Cyclic Syndrome Decoding (QCSD) hardness assumption.</t>
          <t>It has been selected for standardization by NIST.</t>
          <t>The HQC specification is available at <xref target="HQC.SPEC"/>.</t>
          <table anchor="tab-hqc">
            <name>HQC Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">HQC-128</td>
                <td align="left">2249</td>
                <td align="left">2305</td>
                <td align="left">4433</td>
                <td align="left">64</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">HQC-192</td>
                <td align="left">4522</td>
                <td align="left">4586</td>
                <td align="left">8978</td>
                <td align="left">64</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">HQC-256</td>
                <td align="left">7245</td>
                <td align="left">7317</td>
                <td align="left">14421</td>
                <td align="left">64</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="frodokem">
          <name>FrodoKEM</name>
          <t>FrodoKEM is a lattice-based KEM whose security is based on the Learning with Errors (LWE) hardness assumption. Unlike the structured lattices of ML-KEM, FrodoKEM uses unstructured lattices.</t>
          <t>FrodoKEM is being standardized by ISO, and it is mentioned in guidance published by several European security agencies (<xref target="TNO.Handbook"/>, <xref target="ANSSI.PQCMigration"/>, <xref target="BSI.PQCMigration"/>). Some of these agencies recommend in particular the security levels 3 and 5.</t>
          <t>The FrodoKEM specification is available at <xref target="FRODOKEM.SPEC"/>. It includes variants using AES or SHAKE as underlying primitives. Implementations may differ in performance characteristics depending on available hardware support.</t>
          <table anchor="tab-frodokem">
            <name>FrodoKEM Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">FrodoKEM-640-AES</td>
                <td align="left">9616</td>
                <td align="left">19888</td>
                <td align="left">9720</td>
                <td align="left">16</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-640-SHAKE</td>
                <td align="left">9616</td>
                <td align="left">19888</td>
                <td align="left">9720</td>
                <td align="left">16</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-976-AES</td>
                <td align="left">15632</td>
                <td align="left">31296</td>
                <td align="left">15744</td>
                <td align="left">24</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-976-SHAKE</td>
                <td align="left">15632</td>
                <td align="left">31296</td>
                <td align="left">15744</td>
                <td align="left">24</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-1344-AES</td>
                <td align="left">21520</td>
                <td align="left">43088</td>
                <td align="left">21632</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-1344-SHAKE</td>
                <td align="left">21520</td>
                <td align="left">43088</td>
                <td align="left">21632</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="ntru">
          <name>NTRU</name>
          <t>NTRU is a structured lattice-based KEM.</t>
          <t>It is being standardized by ISO.</t>
          <t>The NTRU specification is available at <xref target="NTRU.SPEC"/>.</t>
          <table anchor="tab-ntru">
            <name>NTRU Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ntruhps2048509</td>
                <td align="left">699</td>
                <td align="left">935</td>
                <td align="left">699</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">ntruhps2048677</td>
                <td align="left">930</td>
                <td align="left">1235</td>
                <td align="left">930</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ntruhps4096821</td>
                <td align="left">1230</td>
                <td align="left">1592</td>
                <td align="left">1230</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">ntruhrss701</td>
                <td align="left">1138</td>
                <td align="left">1452</td>
                <td align="left">1138</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ntruhrss1373</td>
                <td align="left">2401</td>
                <td align="left">2983</td>
                <td align="left">2401</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="classic-mceliece">
          <name>Classic McEliece</name>
          <t>Classic McEliece is a code-based KEM, based on the original McEliece cryptosystem from 1978.</t>
          <t>It is being standardized by ISO. Some European security agencies recommend it with specific parameter sets (<xref target="TNO.Handbook"/>, <xref target="BSI.PQCMigration"/>) while ANSSI doesn't recommend it anymore (<xref target="ANSSI.PQCViews"/>).</t>
          <t>Each security level includes a 'f' variant that enables faster key generation, but is internally more complex.</t>
          <t>The Classic McEliece specification is available at <xref target="CLASSICMCELIECE.SPEC"/>.</t>
          <table anchor="tab-cme">
            <name>Classic-McEliece Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Classic-McEliece-348864</td>
                <td align="left">261120</td>
                <td align="left">6492</td>
                <td align="left">96</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-348864f</td>
                <td align="left">261120</td>
                <td align="left">6492</td>
                <td align="left">96</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-460896</td>
                <td align="left">524160</td>
                <td align="left">13608</td>
                <td align="left">156</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-460896f</td>
                <td align="left">524160</td>
                <td align="left">13608</td>
                <td align="left">156</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6688128</td>
                <td align="left">1044992</td>
                <td align="left">13932</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6688128f</td>
                <td align="left">1044992</td>
                <td align="left">13932</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6960119</td>
                <td align="left">1047319</td>
                <td align="left">13948</td>
                <td align="left">194</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6960119f</td>
                <td align="left">1047319</td>
                <td align="left">13948</td>
                <td align="left">194</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-8192128</td>
                <td align="left">1357824</td>
                <td align="left">14120</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-8192128f</td>
                <td align="left">1357824</td>
                <td align="left">14120</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="signature-schemes">
        <name>Signature Schemes</name>
        <t>Digital signatures are cryptographic primitives used to provide authenticity, integrity, and non-repudiation of messages or data.</t>
        <t>In the context of post-quantum cryptography, signature schemes are designed to remain secure against adversaries with quantum computing capabilities. They can be used in various scenarios, including authentication of protocol messages, code signing, and certificates, and are often combined with key establishment mechanisms in secure communication protocols.</t>
        <section anchor="ml-dsa">
          <name>ML-DSA</name>
          <t>ML-DSA is a structured lattice-based signature scheme, now standardized by NIST. It is derived from the CRYSTALS-Dilithium submission to NIST PQC Standardization Project. The security of ML-DSA is based on the computational hardness of the Module Learning with Errors problem as well as the SelfTargetMSIS problem, a variant of the Module Short Integer Solution problem.</t>
          <t>European security agencies recommend at least security level 3.</t>
          <t>The NIST specification of ML-DSA is available at <xref target="MLDSA.SPEC"/>.</t>
          <table anchor="tab-mldsa">
            <name>ML-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ML-DSA-44</td>
                <td align="left">1312</td>
                <td align="left">2560</td>
                <td align="left">2420</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">ML-DSA-65</td>
                <td align="left">1952</td>
                <td align="left">4032</td>
                <td align="left">3309</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ML-DSA-87</td>
                <td align="left">2592</td>
                <td align="left">4896</td>
                <td align="left">4627</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
          <t><xref target="MLDSA.SPEC"/> also allows to use a 32-bytes seed to represent the private key.</t>
        </section>
        <section anchor="fn-dsa">
          <name>FN-DSA</name>
          <t>FN-DSA, formerly known as Falcon, is a lattice-based signature scheme that was selected by NIST for standardization.</t>
          <t>FN-DSA relies on floating-point arithmetic as part of its design, and the specification is available at <xref target="FNDSA.SPEC"/>.</t>
          <t>FN-DSA signatures can be generated in two formats: compressed (Falcon-512 and Falcon-1024) and padded (Falcon-padded-512 and Falcon-padded-1024). The compressed version results in variable-length signatures, shorter on average, while the padded version ensures a constant signature size. In <xref target="tab-fndsa"/>, the indicated variable-length signature size is a maximum.</t>
          <table anchor="tab-fndsa">
            <name>FN-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Falcon-512</td>
                <td align="left">897</td>
                <td align="left">1281</td>
                <td align="left">752</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Falcon-1024</td>
                <td align="left">1793</td>
                <td align="left">2305</td>
                <td align="left">1462</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Falcon-padded-512</td>
                <td align="left">897</td>
                <td align="left">1281</td>
                <td align="left">666</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Falcon-padded-1024</td>
                <td align="left">1793</td>
                <td align="left">2305</td>
                <td align="left">1280</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="slh-dsa">
          <name>SLH-DSA</name>
          <t>SLH-DSA is a stateless hash-based signature scheme standardized by NIST. It is derived from the SPHINCS+ submission to NIST PQC Standardization Project.</t>
          <t>Each security level offers two possible hash function families (SHA-2 or SHAKE), and for each family, two specific variants: the 's' (small signature) variant and the 'f' (fast generation) variant. Each parameter set defines choices affecting signature size and performance characteristics.</t>
          <t>The NIST specification of SLH-DSA is available at <xref target="SLHDSA.SPEC"/>.</t>
          <table anchor="tab-slhdsa">
            <name>SLH-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">SLH-DSA-SHA2-128s</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">7856</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-128s</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">7856</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-128f</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">17088</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-128f</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">17088</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-192s</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">16224</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-192s</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">16224</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-192f</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">35664</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-192f</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">35664</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-256s</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">29762</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-256s</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">29762</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-256f</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">49856</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-256f</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">49856</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="lms">
          <name>LMS</name>
          <t>Leighton-Micali Signatures (LMS) is a stateful hash-based signature scheme based on Merkle hash trees that uses Leighton-Micali One-Time Signatures (LM-OTS) as its component one-time signature scheme. When referring to specific parameter sets and algorithm identifiers in the following tables, the hyphen is omitted (LMOTS) in accordance with the nomenclature established in NIST SP 800-208 <xref target="LMS.SPEC"/> and RFC 8554 <xref target="RFC8554"/> .</t>
          <t>It requires careful state management. <xref target="I-D.draft-ietf-pquip-hbs-state"/> provides guidance and security considerations on state management for stateful hash-based signature schemes.</t>
          <t>The NIST specification of LMS is available at <xref target="LMS.SPEC"/>.</t>
          <section anchor="lms-with-sha-256">
            <name>LMS with SHA-256</name>
            <t>The signatures' sizes for the LMS_SHA256_M32_H{5, 10, 15, 20, 25} signature scheme depend on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256_M32_H{5, 10, 15, 20, 25} are given in a 4-element array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table anchor="tab-lms-sha256">
              <name>LMS with SHA256 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed security level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W1</td>
                  <td align="left">56</td>
                  <td align="left">8504</td>
                  <td align="left">8516</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W2</td>
                  <td align="left">56</td>
                  <td align="left">4280</td>
                  <td align="left">4292</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W4</td>
                  <td align="left">56</td>
                  <td align="left">2168</td>
                  <td align="left">2180</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W8</td>
                  <td align="left">56</td>
                  <td align="left">1112</td>
                  <td align="left">1124</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[1296, 2352, 4464, 8688]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[1456, 2512, 4624, 8848]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1616, 2672, 4784, 9008]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1776, 2832, 4944, 9168]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1936, 2992, 5104, 9328]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-sha-256192">
            <name>LMS with SHA-256/192</name>
            <t>The signatures' sizes for the LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} signature scheme depend on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} are given in a 4-element array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHA256/192 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed security level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W1</td>
                  <td align="left">56</td>
                  <td align="left">4824</td>
                  <td align="left">4828</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W2</td>
                  <td align="left">56</td>
                  <td align="left">2448</td>
                  <td align="left">2452</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W4</td>
                  <td align="left">56</td>
                  <td align="left">1248</td>
                  <td align="left">1251</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W8</td>
                  <td align="left">56</td>
                  <td align="left">648</td>
                  <td align="left">652</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[784, 1384, 2584, 4960]</td>
                  <td align="left">3</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[904, 1504, 2704, 5080]</td>
                  <td align="left">3</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1024, 1624, 2824, 5200]</td>
                  <td align="left">3</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1144, 1744, 2944, 5320]</td>
                  <td align="left">3</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1264, 1864, 3064, 5440]</td>
                  <td align="left">3</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-shake256256">
            <name>LMS with SHAKE256/256</name>
            <t>The signatures' sizes for the LMS_SHAKE_M32_H{5, 10, 15, 20, 25} signature scheme depend on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHAKE_M32_H{5, 10, 15, 20, 25} are given in a 4-element array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHAKE256/256 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed security level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W1</td>
                  <td align="left">56</td>
                  <td align="left">8504</td>
                  <td align="left">8516</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W2</td>
                  <td align="left">56</td>
                  <td align="left">4280</td>
                  <td align="left">4292</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W4</td>
                  <td align="left">56</td>
                  <td align="left">2168</td>
                  <td align="left">2180</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W8</td>
                  <td align="left">56</td>
                  <td align="left">1112</td>
                  <td align="left">1124</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[1296, 2352, 4464, 8688]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[1456, 2512, 4624, 8848]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1616, 2672, 4784, 9008]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1776, 2832, 4944, 9168]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1936, 2992, 5104, 9328]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-shake256192">
            <name>LMS with SHAKE256/192</name>
            <t>The signatures' sizes for the LMS_SHAKE_M24_H{5, 10, 15, 20, 25} signature scheme depend on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHAKE_M24_H{5, 10, 15, 20, 25} are given in a 4-element array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHAKE256/192 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed security level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W1</td>
                  <td align="left">56</td>
                  <td align="left">4824</td>
                  <td align="left">4828</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W2</td>
                  <td align="left">56</td>
                  <td align="left">2448</td>
                  <td align="left">2452</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W4</td>
                  <td align="left">56</td>
                  <td align="left">1248</td>
                  <td align="left">1252</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W8</td>
                  <td align="left">56</td>
                  <td align="left">648</td>
                  <td align="left">652</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[784, 1384, 2584, 4960]</td>
                  <td align="left">3</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[904, 1504, 2704, 5080]</td>
                  <td align="left">3</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1024, 1624, 2824, 5200]</td>
                  <td align="left">3</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1144, 1744, 2944, 5320]</td>
                  <td align="left">3</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1264, 1864, 3064, 5440]</td>
                  <td align="left">3</td>
                </tr>
              </tbody>
            </table>
          </section>
        </section>
        <section anchor="xmss-xmssmt">
          <name>XMSS / XMSS^MT</name>
          <t>The eXtended Merkle Signature Scheme (XMSS) is a stateful hash-based signature scheme that uses WOTS+ for one-time signatures, and is based on Merkle hash trees. XMSS^MT is a variant that has multiple hash trees.</t>
          <t>It requires careful state management. <xref target="I-D.draft-ietf-pquip-hbs-state"/> provides guidance and security considerations on state management for stateful hash-based signature schemes.</t>
          <t>The NIST specification of XMSS is available at <xref target="XMSS.SPEC"/>.</t>
          <table anchor="tab-xmss">
            <name>XMSS Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed security level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">XMSS-SHA2_10_256</td>
                <td align="left">64</td>
                <td align="left">1373</td>
                <td align="left">2500</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_16_256</td>
                <td align="left">64</td>
                <td align="left">2093</td>
                <td align="left">2692</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_20_256</td>
                <td align="left">64</td>
                <td align="left">2573</td>
                <td align="left">2820</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_20/2_256</td>
                <td align="left">64</td>
                <td align="left">5998</td>
                <td align="left">4963</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_20/4_256</td>
                <td align="left">64</td>
                <td align="left">10938</td>
                <td align="left">9251</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/2_256</td>
                <td align="left">64</td>
                <td align="left">9600</td>
                <td align="left">5605</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/4_256</td>
                <td align="left">64</td>
                <td align="left">15252</td>
                <td align="left">9893</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/8_256</td>
                <td align="left">64</td>
                <td align="left">24516</td>
                <td align="left">18469</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/3_256</td>
                <td align="left">64</td>
                <td align="left">16629</td>
                <td align="left">8392</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/6_256</td>
                <td align="left">64</td>
                <td align="left">24507</td>
                <td align="left">14824</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/12_256</td>
                <td align="left">64</td>
                <td align="left">38095</td>
                <td align="left">27688</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_10_192</td>
                <td align="left">48</td>
                <td align="left">1053</td>
                <td align="left">1492</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_16_192</td>
                <td align="left">48</td>
                <td align="left">1605</td>
                <td align="left">1636</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_20_192</td>
                <td align="left">48</td>
                <td align="left">1973</td>
                <td align="left">1732</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_10_256</td>
                <td align="left">64</td>
                <td align="left">1373</td>
                <td align="left">2500</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_16_256</td>
                <td align="left">64</td>
                <td align="left">2093</td>
                <td align="left">2692</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_20_256</td>
                <td align="left">64</td>
                <td align="left">2573</td>
                <td align="left">2820</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_20/2_256</td>
                <td align="left">64</td>
                <td align="left">5998</td>
                <td align="left">4963</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_20/4_256</td>
                <td align="left">64</td>
                <td align="left">10938</td>
                <td align="left">9251</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/2_256</td>
                <td align="left">64</td>
                <td align="left">9600</td>
                <td align="left">5605</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/4_256</td>
                <td align="left">64</td>
                <td align="left">15252</td>
                <td align="left">9893</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/8_256</td>
                <td align="left">64</td>
                <td align="left">24516</td>
                <td align="left">18469</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/3_256</td>
                <td align="left">64</td>
                <td align="left">16629</td>
                <td align="left">8392</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/6_256</td>
                <td align="left">64</td>
                <td align="left">24507</td>
                <td align="left">14824</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/12_256</td>
                <td align="left">64</td>
                <td align="left">38095</td>
                <td align="left">27688</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_10_192</td>
                <td align="left">48</td>
                <td align="left">1053</td>
                <td align="left">1492</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_16_192</td>
                <td align="left">48</td>
                <td align="left">1605</td>
                <td align="left">1636</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_20_192</td>
                <td align="left">48</td>
                <td align="left">1973</td>
                <td align="left">1732</td>
                <td align="left">3</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="quantum-vulnerable-asymmetric-cryptography">
        <name>Quantum-Vulnerable Asymmetric Cryptography</name>
        <t><xref target="tab-vulne"/> gives a list of asymmetric cryptographic schemes that are vulnerable to quantum computers and are planned to be deprecated and/or disallowed in the future by various organizations or security agencies. In particular, NIST provides deprecation and disallowance timelines in <xref target="IR.8547"/>.</t>
        <t>The EU PQC Workstream also published its roadmap for the transition to post-quantum cryptography in <xref target="EU.Roadmap"/>. It distinguishes between low, medium and high quantum risk levels, and recommends completing the PQC transition for high-risk use cases before 2031, for medium-risk use cases before 2036, and for low-risk use cases before 2036, as much as feasible.</t>
        <table anchor="tab-vulne">
          <name>Quantum-Vulnerable Asymmetric Cryptographic Schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Disallowed (NIST)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ECDSA</td>
              <td align="left">Elliptic Curve Discrete Logarithm</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">EdDSA</td>
              <td align="left">Elliptic Curve Discrete Logarithm</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">RSA</td>
              <td align="left">Factorisation</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">(EC)DH</td>
              <td align="left">(Elliptic Curve) Computational/Decisional DH</td>
              <td align="left">after 2035</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="quantum-safe-asymmetric-cryptography">
        <name>Quantum-Safe Asymmetric Cryptography</name>
        <t><xref target="tab-secu-kem"/> gives a brief summary of the security properties of various KEM algorithms.</t>
        <table anchor="tab-secu-kem">
          <name>Properties of KEM schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">SDO</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Security Model</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ML-KEM</td>
              <td align="left">NIST</td>
              <td align="left">Module LWE</td>
              <td align="left">IND-CCA2</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">FrodoKEM</td>
              <td align="left">ISO</td>
              <td align="left">Unstructured LWE</td>
              <td align="left">IND-CCA2</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">HQC</td>
              <td align="left">NIST</td>
              <td align="left">Decisional Quasi-Cyclic Syndrome Decoding Problem</td>
              <td align="left">IND-CCA2</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">Classic McEliece</td>
              <td align="left">ISO</td>
              <td align="left">Syndrome Decoding Problem, Goppa code recovery</td>
              <td align="left">IND-CCA2</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">NTRU</td>
              <td align="left">ISO</td>
              <td align="left">NTRU</td>
              <td align="left">IND-CCA2</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t><xref target="tab-secu-sig"/> gives a summary of the security properties of different signature algorithms.</t>
        <table anchor="tab-secu-sig">
          <name>Properties of signatures schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">SDO</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Security Model</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ML-DSA</td>
              <td align="left">NIST</td>
              <td align="left">Module LWE, SelfTargetMSIS</td>
              <td align="left">SUF-CMA</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">FN-DSA</td>
              <td align="left">NIST</td>
              <td align="left">SIS over NTRU lattices</td>
              <td align="left">EUF-CMA</td>
              <td align="left">Uses floating point arithmetic</td>
            </tr>
            <tr>
              <td align="left">SLH-DSA</td>
              <td align="left">NIST</td>
              <td align="left">Second-preimage resistance</td>
              <td align="left">SUF-CMA (*)</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">LMS</td>
              <td align="left">NIST</td>
              <td align="left">Collision resistance</td>
              <td align="left">SUF-CMA (*)</td>
              <td align="left">Need state management</td>
            </tr>
            <tr>
              <td align="left">XMSS</td>
              <td align="left">NIST</td>
              <td align="left">Collision resistance</td>
              <td align="left">SUF-CMA (*)</td>
              <td align="left">Need state management</td>
            </tr>
          </tbody>
        </table>
        <t>(*) There is no known attack on the SUF-CMA security of those schemes, which are widely believed to be SUF-CMA secure. However, no formal proof exists yet.</t>
      </section>
      <section anchor="evolving-cryptanalysis">
        <name>Evolving Cryptanalysis</name>
        <t>Security analysis of post-quantum cryptographic schemes is an area of active research. The security levels indicated in this document reflect current claims based on existing knowledge. However, these may evolve as cryptanalysis improves.</t>
      </section>
      <section anchor="caveats-for-implementers">
        <name>Caveats for Implementers</name>
        <t>The transition to post-quantum algorithms introduces several technical aspects that differ from traditional asymmetric cryptography:</t>
        <ul spacing="normal">
          <li>
            <t>Side-Channel Analysis: some of the post-quantum schemes presented in this document could present new surfaces for side-channel attacks and the relative complexity of their design could make constant-time implementations more challenging.</t>
          </li>
          <li>
            <t>State Management: stateful hash-based signatures (LMS and XMSS) require the signer to maintain a persistent and accurate record of used one-time keys. Failure to properly manage this state can lead to a catastrophic loss of security for the private key. See <xref target="I-D.draft-ietf-pquip-hbs-state"/> for more details.</t>
          </li>
          <li>
            <t>Resource Constraints: the increased size of public keys, private keys, and signatures/ciphertexts may impact protocols with maximum transmission unit (MTU) limitations or devices with restricted memory and bandwidth.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA action.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank Sun Shuzhou and Zeng Guang for their valuable comments and recommendations on this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8554">
          <front>
            <title>Leighton-Micali Hash-Based Signatures</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Curcio" initials="M." surname="Curcio"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This note describes a digital-signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and Micali in 1995. It specifies a one-time signature scheme and a general signature scheme. These systems provide asymmetric authentication without using large integer mathematics and can achieve a high security level. They are suitable for compact implementations, are relatively simple to implement, and are naturally resistant to side-channel attacks. Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF. This has been reviewed by many researchers, both in the research group and outside of it. The Acknowledgements section lists many of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8554"/>
          <seriesInfo name="DOI" value="10.17487/RFC8554"/>
        </reference>
        <reference anchor="I-D.draft-ietf-pquip-hbs-state">
          <front>
            <title>Hash-based Signatures: State and Backup Management</title>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization>PQShield</organization>
            </author>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Stefan Kölbl" initials="S." surname="Kölbl">
              <organization>Google</organization>
            </author>
            <author fullname="Jim Goodman" initials="J." surname="Goodman">
              <organization>Crypto4A Technologies</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   Stateful Hash-Based Signature Schemes (Stateful HBS) such as
   Leighton-Micali Signature (LMS), Hierarchical Signature System (HSS),
   eXtended Merkle Signature Scheme (XMSS), and XMSS^MT combine Merkle
   trees with One-Time Signatures (OTS) to provide signatures that are
   resistant against attacks using large-scale quantum computers.
   Unlike conventional stateless digital signature schemes, Stateful HBS
   have a state to keep track of which OTS keys have been used, as
   double-signing with the same OTS key allows forgeries.

   This document provides guidance and catalogs security considerations
   for the operational and technical aspects of deploying systems that
   rely on Stateful HBS.  Management of the state of the Stateful HBS,
   including any handling of redundant key material, is a sensitive
   topic.  This document describes some approaches to handle the
   associated challenges.  It also describes the challenges that need to
   be resolved before certain approaches should be considered.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hbs-state-04"/>
        </reference>
        <reference anchor="MLKEM.SPEC" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="FRODOKEM.SPEC" target="https://frodokem.org/files/FrodoKEM_standard_proposal_20241205.pdf">
          <front>
            <title>FrodoKEM: Learning With Errors Key Encapsulation</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="CLASSICMCELIECE.SPEC" target="https://classic.mceliece.org/mceliece-spec-20221023.pdf">
          <front>
            <title>Classic McEliece: conservative code-based cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="October"/>
          </front>
        </reference>
        <reference anchor="HQC.SPEC" target="https://pqc-hqc.org/doc/hqc-specification_2025-02-19.pdf">
          <front>
            <title>Hamming Quasi-Cyclic (HQC)</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="NTRU.SPEC" target="https://www.ietf.org/id/draft-fluhrer-cfrg-ntru-02.html">
          <front>
            <title>NTRU Key Encapsulation</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="MLDSA.SPEC" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="FNDSA.SPEC" target="https://falcon-sign.info/falcon.pdf">
          <front>
            <title>Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="SLHDSA.SPEC" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="LMS.SPEC" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="XMSS.SPEC" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="IR.8547" target="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf">
          <front>
            <title>Transition to Post-Quantum Cryptography Standards</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="EU.Roadmap" target="https://digital-strategy.ec.europa.eu/en/library/coordinated-implementation-roadmap-transition-post-quantum-cryptography">
          <front>
            <title>A Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography</title>
            <author>
              <organization>EU PQC Workstream</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="TNO.Handbook" target="https://publications.tno.nl/publication/34643386/fXcPVHsX/TNO-2024-pqc-en.pdf">
          <front>
            <title>The PQC Migration Handbook</title>
            <author>
              <organization>AIVD, CWI, TNO</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="ANSSI.PQCMigration" target="https://messervices.cyber.gouv.fr/documents-guides/Avis%20de%20l%27ANSSI%20sur%20la%20migration%20vers%20la%20cryptographie.pdf">
          <front>
            <title>Avis de l'ANSSI sur la migration vers la cryptographie post-quantique (suivi 2023)</title>
            <author>
              <organization>ANSSI</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="ANSSI.PQCViews" target="https://na.eventscloud.com/file_uploads/b635298de1c10be6d3732863e8b1beca_Day2-1600-ANSSI.pdf">
          <front>
            <title>Cryptographic Mechanisms: Recommendations and Key Lengths</title>
            <author>
              <organization>ANSSI</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="BSI.PQCMigration" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-1.pdf?__blob=publicationFile&amp;v=10">
          <front>
            <title>Cryptographic Mechanisms: Recommendations and Key Lengths</title>
            <author>
              <organization>BSI</organization>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
