<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-prabel-pquip-pqc-guidance-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="PQC Algo Guidance">Post-Quantum Algorithms guidance</title>
    <seriesInfo name="Internet-Draft" value="draft-prabel-pquip-pqc-guidance-00"/>
    <author initials="L." surname="Prabel" fullname="Lucas Prabel">
      <organization>Huawei</organization>
      <address>
        <email>lucas.prabel@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Sun" fullname="Shuzhou Sun">
      <organization>Huawei</organization>
      <address>
        <email>sunshuzhou@huawei.com</email>
      </address>
    </author>
    <author initials="G." surname="Zeng" fullname="Guang Zeng">
      <organization>Huawei</organization>
      <address>
        <email>zengguang13@huawei.com</email>
      </address>
    </author>
    <author initials="G." surname="Wang" fullname="Guilin Wang">
      <organization>Huawei</organization>
      <address>
        <email>wang.guilin@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="02"/>
    <area>Security</area>
    <workgroup>PQUIP</workgroup>
    <keyword>PQUIP</keyword>
    <keyword>Migration</keyword>
    <keyword>PQC</keyword>
    <keyword>Parameters</keyword>
    <keyword>Algorithms</keyword>
    <abstract>
      <?line 124?>

<t>This document provides general information (such as parameter sizes, security assumptions, and targeted security models) on a range of widely studied post-quantum cryptographic algorithms, including Key Encapsulation Mechanisms (KEMs) and digital signature schemes.</t>
      <t>The cryptographic schemes described in this document are among those recommended by major security agencies and/or standardization bodies, and are believed to be secure against Cryptographically Relevant Quantum Computer (CRQC).</t>
      <t>The goal of this document is to offer a high-level overview of these schemes and their distinguishing features, to help implementers, protocol designers, standards developers, and policymakers in understanding and selecting appropriate post-quantum cryptographic primitives for use in protocols and systems.</t>
      <t>By aggregating and presenting this information in a unified format, this document aims to facilitate informed decision-making and interoperability during the migration to post-quantum cryptography, and to encourage consistent practices when evaluating and deploying PQC schemes in cryptographic protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-prabel-pquip-pqc-guidance/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Post-Quantum Use In Protocols Working Group mailing list (<eref target="mailto:pqc@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pqc/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>
  </front>
  <middle>
    <?line 135?>

<section anchor="introduction">
      <name>Introduction</name>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document follows the terminology for post-quantum hybrid schemes defined in <xref target="I-D.draft-ietf-pquip-pqt-hybrid-terminology-04"/>.</t>
      <t>This section recalls some of this terminology, but also adds other definitions used throughout the whole document:</t>
      <t><em>Traditional Asymmetric Cryptographic Algorithm</em>:  An asymmetric
   cryptographic algorithm based on integer factorisation, finite
   field discrete logarithms, elliptic curve discrete logarithms, or
   related mathematical problems. They can also be called classical or
   conventional algorithms.</t>
      <t><em>Post-Quantum Asymmetric Cryptographic Algorithm</em>:  An asymmetric
cryptographic algorithm that is intended to be secure against
attacks using quantum computers as well as classical computers.
They can also be called quantum-resistant or quantum-safe algorithms.</t>
      <t>As with all cryptography, it always remains the case that attacks, either quantum or classical, may be found against post-quantum algorithms.  Therefore it should not be assumed that just because an algorithm is designed to provide post-quantum security it will not be compromised.  Should an attack be found against a post-quantum algorithm, it is commonly still referred to as a post- quantum algorithm as they were designed to protect against an adversary with access to a CRQC and the labels are referring to the designed or desired properties.</t>
      <t><em>IND-CCA2</em>: Indistinguishability under Adaptive Chosen-Ciphertext Attack. It is the standard security notion for KEM schemes.</t>
      <t><em>EUF-CMA</em>: Existential Unforgeability under Chosen-Message Attack. It is the standard security notion for digital signature schemes.</t>
      <t><em>SUF-CMA</em>: Strong Existential Unforgeability under Chosen-Message Attack. It is a stronger security notion than EUF-CMA.</t>
    </section>
    <section anchor="parameter-sizes">
      <name>Parameter Sizes</name>
      <t>This section is divided into two different subsections, one focused on Key Encapsulation Mechanism, and the other on signature schemes.</t>
      <t>The "claimed security level" in each table refers to the NIST Post-Quantum Cryptography Evaluation Criteria. We summarize this classification in <xref target="tab-security-level"/> below. Additional details is available at <xref target="IR.8547"/>.</t>
      <table anchor="tab-security-level">
        <name>NIST Post-Quantum Cryptography Classification</name>
        <thead>
          <tr>
            <th align="left">Security Category</th>
            <th align="left">Attack Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">Key search on a block cipher with a 128-bit key</td>
            <td align="left">AES-128</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">Collision search on a 256-bit hash function</td>
            <td align="left">SHA-256</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">Key search on a block cipher with a 192-bit key</td>
            <td align="left">AES-192</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">Collision search on a 384-bit hash function</td>
            <td align="left">SHA3-384</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">Key search on a block cipher with a 256-bit key</td>
            <td align="left">AES-256</td>
          </tr>
        </tbody>
      </table>
      <section anchor="key-encapsulation-mechanism-kem-schemes">
        <name>Key Encapsulation Mechanism (KEM) Schemes</name>
        <section anchor="ml-kem">
          <name>ML-KEM</name>
          <t>ML-KEM, formerly known as CRYSTALS-Kyber, is a structured lattice-based KEM, the first PQC KEM standardized by NIST. The security of ML-KEM is based on the computational hardness of the Module Learning with Errors problem.</t>
          <t>NIST recommends Security Level 3 by default, and European security agencies recommend a minimum of the same security level.</t>
          <t>The NIST specification of ML-KEM is available at <xref target="MLKEM.SPEC"/>.</t>
          <table anchor="tab-mlkem">
            <name>ML-KEM Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ML-KEM-512</td>
                <td align="left">800</td>
                <td align="left">1632</td>
                <td align="left">768</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">ML-KEM-768</td>
                <td align="left">1184</td>
                <td align="left">2400</td>
                <td align="left">1088</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ML-KEM-1024</td>
                <td align="left">1568</td>
                <td align="left">2168</td>
                <td align="left">1568</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
          <t><xref target="MLKEM.SPEC"/> also allows to use a 64 bytes seed to represent the private key.</t>
        </section>
        <section anchor="frodokem">
          <name>FrodoKEM</name>
          <t>FrodoKEM is a lattice-based KEM, whose security is based on the plain Learning with Errors (LWE) hardness assumption, unlike ML-KEM which is based on structured lattices. This makes FrodoKEM a more conservative KEM scheme.</t>
          <t>It is considered for standardization by ISO, and it is recommended by European security agencies.</t>
          <t>Each security level allows the choice between AES and SHAKE as the underlying symmetric primitive. The AES variant is beneficial on devices with AES hardware acceleration, while the SHAKE variant generally provides better performance if hardware acceleration is not available.</t>
          <t>The FrodoKEM specification is available at <xref target="FRODOKEM.SPEC"/>.</t>
          <table anchor="tab-frodokem">
            <name>FrodoKEM Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">FrodoKEM-640-AES</td>
                <td align="left">9616</td>
                <td align="left">19888</td>
                <td align="left">9720</td>
                <td align="left">16</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-640-SHAKE</td>
                <td align="left">9616</td>
                <td align="left">19888</td>
                <td align="left">9720</td>
                <td align="left">16</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-976-AES</td>
                <td align="left">15632</td>
                <td align="left">31296</td>
                <td align="left">15744</td>
                <td align="left">24</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-976-SHAKE</td>
                <td align="left">15632</td>
                <td align="left">31296</td>
                <td align="left">15744</td>
                <td align="left">24</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-1344-AES</td>
                <td align="left">21520</td>
                <td align="left">43088</td>
                <td align="left">21632</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-1344-SHAKE</td>
                <td align="left">21520</td>
                <td align="left">43088</td>
                <td align="left">21632</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="classic-mceliece">
          <name>Classic McEliece</name>
          <t>Classic McEliece is a conservative, code-based KEM, based on the original McEliece cryptosystem from 1978.</t>
          <t>It requires larger key sizes compared to the other KEMs discussed here, but relatively small ciphertext sizes.</t>
          <t>Each security level includes an 'f' variant that is more complex internally than the 'non-f' variant but enables faster key generation.</t>
          <t>It has withstood extensive cryptanalysis over several decades, and several European security agencies have expressed confidence in its security. It is considered for standardization by ISO.</t>
          <t>The Classic McEliece specification is available at <xref target="CLASSICMCELIECE.SPEC"/>.</t>
          <table anchor="tab-cme">
            <name>Classic-McEliece Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Classic-McEliece-348864</td>
                <td align="left">261120</td>
                <td align="left">6492</td>
                <td align="left">96</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-348864f</td>
                <td align="left">261120</td>
                <td align="left">6492</td>
                <td align="left">96</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-460896</td>
                <td align="left">524160</td>
                <td align="left">13608</td>
                <td align="left">156</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-460896f</td>
                <td align="left">524160</td>
                <td align="left">13608</td>
                <td align="left">156</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6688128</td>
                <td align="left">1044992</td>
                <td align="left">13932</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6688128f</td>
                <td align="left">1044992</td>
                <td align="left">13932</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6960119</td>
                <td align="left">1047319</td>
                <td align="left">13948</td>
                <td align="left">194</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6960119f</td>
                <td align="left">1047319</td>
                <td align="left">13948</td>
                <td align="left">194</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-8192128</td>
                <td align="left">1357824</td>
                <td align="left">14120</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-8192128f</td>
                <td align="left">1357824</td>
                <td align="left">14120</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="hqc">
          <name>HQC</name>
          <t>HQC is a code-based KEM relying on the decisional Quasi-Cyclic Syndrome Decoding (QCSD) hardness assumption.</t>
          <t>HQC offers small public key and ciphertext sizes, although these are larger than those of ML-KEM.</t>
          <t>It will be standardized by NIST.</t>
          <t>The HQC specification is available at <xref target="HQC.SPEC"/>.</t>
          <table anchor="tab-hqc">
            <name>HQC Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">HQC-128</td>
                <td align="left">2249</td>
                <td align="left">2305</td>
                <td align="left">4433</td>
                <td align="left">64</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">HQC-192</td>
                <td align="left">4522</td>
                <td align="left">4586</td>
                <td align="left">8978</td>
                <td align="left">64</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">HQC-256</td>
                <td align="left">7245</td>
                <td align="left">7317</td>
                <td align="left">14421</td>
                <td align="left">64</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="ntru">
          <name>NTRU</name>
          <t>NTRU is a structured lattice-based KEM. It has a long, well-established history and has been widely analyzed.</t>
          <t>It is considered for standardization by ISO.</t>
          <t>The NTRU specification is available at <xref target="NTRU.SPEC"/>.</t>
          <table anchor="tab-ntru">
            <name>NTRU Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ntruhps2048509</td>
                <td align="left">699</td>
                <td align="left">935</td>
                <td align="left">699</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">ntruhps2048677</td>
                <td align="left">930</td>
                <td align="left">1235</td>
                <td align="left">930</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ntruhps4096821</td>
                <td align="left">1230</td>
                <td align="left">1592</td>
                <td align="left">1230</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">ntruhrss701</td>
                <td align="left">1138</td>
                <td align="left">1452</td>
                <td align="left">1138</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ntruhrss1373</td>
                <td align="left">2401</td>
                <td align="left">2983</td>
                <td align="left">2401</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="signature-scheme">
        <name>Signature Scheme</name>
        <section anchor="ml-dsa">
          <name>ML-DSA</name>
          <t>ML-DSA, formerly known as CRYSTALS-Dilithium, is a structured lattice-based signature scheme, now standardized by NIST. The security of ML-DSA is based on the computational hardness of the Module Learning with Errors problem as well as the SelfTargetMSIS problem, a variant of the Module Short Integer Solution problem.</t>
          <t>European security agencies recommend at least Security Level 3.</t>
          <t>The NIST specification of ML-DSA is available at <xref target="MLDSA.SPEC"/>.</t>
          <table anchor="tab-mldsa">
            <name>ML-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ML-DSA-44</td>
                <td align="left">1312</td>
                <td align="left">2560</td>
                <td align="left">2420</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">ML-DSA-65</td>
                <td align="left">1952</td>
                <td align="left">4032</td>
                <td align="left">3309</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ML-DSA-87</td>
                <td align="left">2592</td>
                <td align="left">4896</td>
                <td align="left">4627</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
          <t><xref target="MLDSA.SPEC"/> also allows to use a 32 bytes seed to represent the private key.</t>
        </section>
        <section anchor="fn-dsa">
          <name>FN-DSA</name>
          <t>FN-DSA, formerly known as Falcon, is a lattice-based signature scheme that was selected by NIST for standardization.</t>
          <t>It relies on floating-point arithmetic, which is considered challenging to implement securely, especially with respect to side-channel attacks.</t>
          <t>The Falcon specification is available at <xref target="FNDSA.SPEC"/>.</t>
          <table anchor="tab-fndsa">
            <name>FN-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Falcon-512</td>
                <td align="left">897</td>
                <td align="left">1281</td>
                <td align="left">752</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Falcon-1024</td>
                <td align="left">1793</td>
                <td align="left">2305</td>
                <td align="left">1462</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Falcon-padded-512</td>
                <td align="left">897</td>
                <td align="left">1281</td>
                <td align="left">666</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Falcon-padded-1024</td>
                <td align="left">1793</td>
                <td align="left">2305</td>
                <td align="left">1280</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="slh-dsa">
          <name>SLH-DSA</name>
          <t>SLH-DSA, formerly known as SPHINCS+, is a stateless hash-based signature scheme now standardized by NIST.</t>
          <t>Each security level offers two possible hash function families (SHA-2 or SHAKE) and for both, two specific variants. The 's' variant has smaller signature sizes, while the 'f' variant has faster signature generation.</t>
          <t>The NIST specification of SLH-DSA is available at <xref target="SLHDSA.SPEC"/>.</t>
          <table anchor="tab-slhdsa">
            <name>SLH-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">SLH-DSA-SHA2-128s</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">7856</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-128s</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">7856</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-128f</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">17088</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-128f</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">17088</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-192s</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">16224</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-192s</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">16224</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-192f</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">35664</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-192f</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">35664</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-256s</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">29762</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-256s</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">29762</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-256f</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">49856</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-256f</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">49856</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="lms">
          <name>LMS</name>
          <t>Leighton-Micali Signatures (LMS) is a stateful hash-based signature scheme that uses LM-OTS for one-time signatures, and is based on Merkle hash trees.</t>
          <t>It requires careful state management. <xref target="I-D.draft-ietf-pquip-hbs-state"/> provides guidance and security considerations on state management for stateful hash-based signature schemes.</t>
          <t>The NIST specification of LMS is available at <xref target="LMS.SPEC"/>.</t>
          <section anchor="lms-with-sha-256">
            <name>LMS with SHA-256</name>
            <t>The signatures' sizes for the LMS_SHA256_M32_H{5, 10, 15, 20, 25} signature scheme depends on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256_M32_H{5, 10, 15, 20, 25} are given in a 4-elements array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table anchor="tab-lms-sha256">
              <name>LMS with SHA256 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed Security Level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W1</td>
                  <td align="left">56</td>
                  <td align="left">8504</td>
                  <td align="left">8516</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W2</td>
                  <td align="left">56</td>
                  <td align="left">4280</td>
                  <td align="left">4292</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W4</td>
                  <td align="left">56</td>
                  <td align="left">2168</td>
                  <td align="left">2180</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W8</td>
                  <td align="left">56</td>
                  <td align="left">1112</td>
                  <td align="left">1124</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[1296, 2352, 4464, 8688]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[1456, 2512, 4624, 8848]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1616, 2672, 4784, 9008]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1776, 2832, 4944, 9168]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1936, 2992, 5104, 9328]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-sha-256192">
            <name>LMS with SHA-256/192</name>
            <t>The signatures' sizes for the LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} signature scheme depends on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} are given in a 4-elements array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHA256/192 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed Security Level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W1</td>
                  <td align="left">56</td>
                  <td align="left">4824</td>
                  <td align="left">4828</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W2</td>
                  <td align="left">56</td>
                  <td align="left">2448</td>
                  <td align="left">2452</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W4</td>
                  <td align="left">56</td>
                  <td align="left">1248</td>
                  <td align="left">1251</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W8</td>
                  <td align="left">56</td>
                  <td align="left">648</td>
                  <td align="left">652</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[784, 1384, 2584, 4960]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[904, 1504, 2704, 5080]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1024, 1624, 2824, 5200]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1144, 1744, 2944, 5320]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1264, 1864, 3064, 5440]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-shake256256">
            <name>LMS with SHAKE256/256</name>
            <t>The signatures' sizes for the LMS_SHA256_M32_H{5, 10, 15, 20, 25} signature scheme depends on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256_M32_H{5, 10, 15, 20, 25} are given in a 4-elements array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHAKE256/256 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed Security Level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W1</td>
                  <td align="left">56</td>
                  <td align="left">8504</td>
                  <td align="left">8516</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W2</td>
                  <td align="left">56</td>
                  <td align="left">4280</td>
                  <td align="left">4292</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W4</td>
                  <td align="left">56</td>
                  <td align="left">2168</td>
                  <td align="left">2180</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W8</td>
                  <td align="left">56</td>
                  <td align="left">1112</td>
                  <td align="left">1124</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[1296, 2352, 4464, 8688]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[1456, 2512, 4624, 8848]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1616, 2672, 4784, 9008]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1776, 2832, 4944, 9168]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1936, 2992, 5104, 9328]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-shake256192">
            <name>LMS with SHAKE256/192</name>
            <t>The signatures' sizes for the LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} signature scheme depends on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} are given in a 4-elements array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHAKE256/192 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed Security Level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W1</td>
                  <td align="left">56</td>
                  <td align="left">4824</td>
                  <td align="left">4828</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W2</td>
                  <td align="left">56</td>
                  <td align="left">2448</td>
                  <td align="left">2452</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W4</td>
                  <td align="left">56</td>
                  <td align="left">1248</td>
                  <td align="left">1252</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W8</td>
                  <td align="left">56</td>
                  <td align="left">648</td>
                  <td align="left">652</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[784, 1384, 2584, 4960]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[904, 1504, 2704, 5080]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1024, 1624, 2824, 5200]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1144, 1744, 2944, 5320]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1264, 1864, 3064, 5440]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
        </section>
        <section anchor="xmss-xmssmt">
          <name>XMSS / XMSS^MT</name>
          <t>The eXtended Merkle Signature Scheme (XMSS) is a stateful hash-based signature scheme that uses WOTS+ for one-time signatures, and is based on Merkle hash trees. XMSS^MT is a variant that has multiple hash trees.</t>
          <t>It requires careful state management. <xref target="I-D.draft-ietf-pquip-hbs-state"/> provides guidance and security considerations on state management for stateful hash-based signature schemes.</t>
          <t>The NIST specification of XMSS is available at <xref target="XMSS.SPEC"/>.</t>
          <table anchor="tab-xmss">
            <name>XMSS Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">XMSS-SHA2_10_256</td>
                <td align="left">64</td>
                <td align="left">1793</td>
                <td align="left">2500</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_16_256</td>
                <td align="left">64</td>
                <td align="left">2093</td>
                <td align="left">2692</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_20_256</td>
                <td align="left">64</td>
                <td align="left">2573</td>
                <td align="left">2820</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_20/2_256</td>
                <td align="left">64</td>
                <td align="left">5998</td>
                <td align="left">4963</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_20/4_256</td>
                <td align="left">64</td>
                <td align="left">10938</td>
                <td align="left">9251</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/2_256</td>
                <td align="left">64</td>
                <td align="left">9600</td>
                <td align="left">5605</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/4_256</td>
                <td align="left">64</td>
                <td align="left">15252</td>
                <td align="left">9893</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/8_256</td>
                <td align="left">64</td>
                <td align="left">24516</td>
                <td align="left">18469</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/3_256</td>
                <td align="left">64</td>
                <td align="left">16629</td>
                <td align="left">8392</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/6_256</td>
                <td align="left">64</td>
                <td align="left">24507</td>
                <td align="left">14824</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/12_256</td>
                <td align="left">64</td>
                <td align="left">38095</td>
                <td align="left">27688</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_10_192</td>
                <td align="left">48</td>
                <td align="left">1053</td>
                <td align="left">1492</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_16_192</td>
                <td align="left">48</td>
                <td align="left">1605</td>
                <td align="left">1636</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_20_192</td>
                <td align="left">48</td>
                <td align="left">1973</td>
                <td align="left">1732</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_10_256</td>
                <td align="left">64</td>
                <td align="left">1373</td>
                <td align="left">2500</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_16_256</td>
                <td align="left">64</td>
                <td align="left">2093</td>
                <td align="left">2692</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_20_256</td>
                <td align="left">64</td>
                <td align="left">2573</td>
                <td align="left">2820</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_20/2_256</td>
                <td align="left">64</td>
                <td align="left">5998</td>
                <td align="left">4963</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_20/4_256</td>
                <td align="left">64</td>
                <td align="left">10938</td>
                <td align="left">9251</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/2_256</td>
                <td align="left">64</td>
                <td align="left">9600</td>
                <td align="left">5605</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/4_256</td>
                <td align="left">64</td>
                <td align="left">15252</td>
                <td align="left">9893</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/8_256</td>
                <td align="left">64</td>
                <td align="left">24516</td>
                <td align="left">18469</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/3_256</td>
                <td align="left">64</td>
                <td align="left">24516</td>
                <td align="left">8392</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/6_256</td>
                <td align="left">64</td>
                <td align="left">24507</td>
                <td align="left">14824</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/12_256</td>
                <td align="left">64</td>
                <td align="left">38095</td>
                <td align="left">27688</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_10_192</td>
                <td align="left">48</td>
                <td align="left">1053</td>
                <td align="left">1492</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_16_192</td>
                <td align="left">48</td>
                <td align="left">1605</td>
                <td align="left">1636</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_20_192</td>
                <td align="left">48</td>
                <td align="left">1973</td>
                <td align="left">1732</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-properties">
      <name>Security Properties</name>
      <section anchor="quantum-vulnerable-asymmetric-cryptography">
        <name>Quantum-Vulnerable Asymmetric Cryptography</name>
        <t><xref target="tab-vulne"/> gives a list of asymmetric cryptographic schemes that are vulnerable to quantum computers and are planned to be deprecated and/or disallowed in the future by various organizations or security agencies. In particular, NIST provides deprecation and disallowance timelines in <xref target="IR.8547"/>.</t>
        <t>The EU PQC Workstream also published its roadmap for the transition to post-quantum cryptography in <xref target="EU.Roadmap"/>. It distinguishes between low, medium and high quantum risk levels, and recommends completing the PQC transition for high-risk use cases before 2031, for medium-risk use cases before 2036, and for low-risk use cases before 2036, as much as feasible.</t>
        <table anchor="tab-vulne">
          <name>Quantum-Vulnerable Asymmetric Cryptographic Schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Disallowed (NIST)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ECDSA</td>
              <td align="left">Discrete Logarithm</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">EdDSA</td>
              <td align="left">Discrete Logarithm</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">RSA</td>
              <td align="left">Factorisation</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">(EC)DH</td>
              <td align="left">Decisional Diffie Hellman</td>
              <td align="left">after 2035</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="quantum-safe-asymmetric-cryptography">
        <name>Quantum-Safe Asymmetric Cryptography</name>
        <t><xref target="tab-secu-kem"/> gives a brief summary of the security properties of various KEM algorithms.</t>
        <table anchor="tab-secu-kem">
          <name>Propeties of KEM schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">SDO</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Security Model</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ML-KEM</td>
              <td align="left">NIST</td>
              <td align="left">Module LWE</td>
              <td align="left">IND-CCA-2</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">FrodoKEM</td>
              <td align="left">ISO</td>
              <td align="left">Unstructured LWE</td>
              <td align="left">IND-CCA2</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">HQC</td>
              <td align="left">NIST</td>
              <td align="left">Decisional Quasi-Cyclic Syndrome Decoding Problem</td>
              <td align="left">IND-CCA2</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">Classic McEliece</td>
              <td align="left">ISO</td>
              <td align="left">Syndrome Decoding Problem, Goppa code recovery</td>
              <td align="left">IND-CCA2</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">NTRU</td>
              <td align="left">ISO</td>
              <td align="left">NTRU</td>
              <td align="left">IND-CCA2</td>
              <td align="left">xxx</td>
            </tr>
          </tbody>
        </table>
        <t>FrodoKEM is believed to have conservative security compared to schemes based on structured lattices like ML-KEM or NTRU.</t>
        <t><xref target="tab-secu-sig"/> gives a summary of the security properties of different signature algorithms.</t>
        <table anchor="tab-secu-sig">
          <name>Propeties of signatures schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">SDO</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Security Model</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ML-DSA</td>
              <td align="left">NIST</td>
              <td align="left">Module LWE, SelfTargetMSIS</td>
              <td align="left">SUF-CMA</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">FN-DSA</td>
              <td align="left">NIST</td>
              <td align="left">SIS over NTRU lattices</td>
              <td align="left">EUF-CMA</td>
              <td align="left">Uses floating point arithmetic</td>
            </tr>
            <tr>
              <td align="left">SLH-DSA</td>
              <td align="left">NIST</td>
              <td align="left">Second-preimage resistance</td>
              <td align="left">SUF-CMA</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">LMS</td>
              <td align="left">NIST</td>
              <td align="left">Collision resistance</td>
              <td align="left">EUF-CMA</td>
              <td align="left">Need state management</td>
            </tr>
            <tr>
              <td align="left">XMSS</td>
              <td align="left">NIST</td>
              <td align="left">Collision resistance</td>
              <td align="left">EUF-CMA</td>
              <td align="left">Need state management</td>
            </tr>
          </tbody>
        </table>
        <t>Hash-based signature schemes such as SLH-DSA, LMS, and XMSS are believed to offer more conservative security compared to lattice-based schemes like ML-DSA or FN-DSA.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA action.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-pquip-pqt-hybrid-terminology-04">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="I-D.draft-ietf-pquip-hbs-state">
          <front>
            <title>Hash-based Signatures: State and Backup Management</title>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization>PQShield</organization>
            </author>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Stefan Kölbl" initials="S." surname="Kölbl">
              <organization>Google</organization>
            </author>
            <author fullname="Jim Goodman" initials="J." surname="Goodman">
              <organization>Crypto4A Technologies</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="17" month="June" year="2025"/>
            <abstract>
              <t>   Stateful Hash-Based Signature Schemes (S-HBS) such as LMS, HSS, XMSS
   and XMSS^MT combine Merkle trees with One-Time Signatures (OTS) to
   provide signatures that are resistant against attacks using large-
   scale quantum computers.  Unlike conventional stateless digital
   signature schemes, S-HBS have a state to keep track of which OTS keys
   have been used, as double-signing with the same OTS key allows
   forgeries.

   This document provides guidance and documents security considerations
   for the operational and technical aspects of deploying systems that
   rely on S-HBS.  Management of the state of the S-HBS, including any
   handling of redundant key material, is a sensitive topic, and we
   discuss some approaches to handle the associated challenges.  We also
   describe the challenges that need to be resolved before certain
   approaches should be considered.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hbs-state-00"/>
        </reference>
        <reference anchor="MLKEM.SPEC" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="FRODOKEM.SPEC" target="https://frodokem.org/files/FrodoKEM_standard_proposal_20241205.pdf">
          <front>
            <title>FrodoKEM: Learning With Errors Key Encapsulation</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="CLASSICMCELIECE.SPEC" target="https://classic.mceliece.org/mceliece-spec-20221023.pdf">
          <front>
            <title>Classic McEliece: conservative code-based cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="October"/>
          </front>
        </reference>
        <reference anchor="HQC.SPEC" target="https://pqc-hqc.org/doc/hqc-specification_2025-02-19.pdf">
          <front>
            <title>Hamming Quasi-Cyclic (HQC)</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="NTRU.SPEC" target="https://www.ietf.org/id/draft-fluhrer-cfrg-ntru-02.html">
          <front>
            <title>NTRU Key Encapsulation</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="MLDSA.SPEC" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="FNDSA.SPEC" target="https://falcon-sign.info/falcon.pdf">
          <front>
            <title>Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="SLHDSA.SPEC" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="LMS.SPEC" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="XMSS.SPEC" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="IR.8547" target="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf">
          <front>
            <title>Transition to Post-Quantum Cryptography Standards</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="EU.Roadmap" target="https://digital-strategy.ec.europa.eu/en/library/coordinated-implementation-roadmap-transition-post-quantum-cryptography">
          <front>
            <title>A Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography</title>
            <author>
              <organization>EU PQC Workstream</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
