<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-prabel-pquip-pqc-guidance-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Algo Guidance">Post-Quantum Algorithms guidance</title>
    <seriesInfo name="Internet-Draft" value="draft-prabel-pquip-pqc-guidance-01"/>
    <author initials="L." surname="Prabel" fullname="Lucas Prabel">
      <organization>Huawei</organization>
      <address>
        <email>lucas.prabel@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Sun" fullname="Shuzhou Sun">
      <organization>Huawei</organization>
      <address>
        <email>sunshuzhou@huawei.com</email>
      </address>
    </author>
    <author initials="G." surname="Zeng" fullname="Guang Zeng">
      <organization>Huawei</organization>
      <address>
        <email>zengguang13@huawei.com</email>
      </address>
    </author>
    <author initials="G." surname="Wang" fullname="Guilin Wang">
      <organization>Huawei</organization>
      <address>
        <email>wang.guilin@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>PQUIP</workgroup>
    <keyword>PQUIP</keyword>
    <keyword>Migration</keyword>
    <keyword>PQC</keyword>
    <keyword>Parameters</keyword>
    <keyword>Algorithms</keyword>
    <abstract>
      <?line 123?>

<t>This document provides general information (such as parameter sizes, security assumptions, and targeted security models) on a range of widely studied post-quantum cryptographic algorithms, including Key Encapsulation Mechanisms (KEMs) and digital signature schemes.</t>
      <t>The cryptographic schemes described in this document are among those recommended by major security agencies and/or standardization bodies, and are believed to be secure against Cryptographically Relevant Quantum Computer (CRQC).</t>
      <t>The goal of this document is to offer a high-level overview of these schemes and their distinguishing features, to help implementers, protocol designers, standards developers, and policymakers in understanding and selecting appropriate post-quantum cryptographic primitives for use in protocols and systems.</t>
      <t>By aggregating and presenting this information in a unified format, this document aims to facilitate informed decision-making and interoperability during the migration to post-quantum cryptography, and to encourage consistent practices when evaluating and deploying Post-Quantum Cryptography (PQC) schemes in cryptographic protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-prabel-pquip-pqc-guidance/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Post-Quantum Use In Protocols Working Group mailing list (<eref target="mailto:pqc@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/pqc/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/pqc/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>
  </front>
  <middle>
    <?line 134?>

<section anchor="introduction">
      <name>Introduction</name>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document follows the terminology for post-quantum hybrid schemes defined in <xref target="I-D.draft-ietf-pquip-pqt-hybrid-terminology-04"/>.</t>
      <t>This section recalls some of this terminology, but also adds other definitions used throughout the whole document:</t>
      <t><em>Traditional Asymmetric Cryptographic Algorithm</em>:  An asymmetric
   cryptographic algorithm based on integer factorisation, finite
   field discrete logarithms, elliptic curve discrete logarithms, or
   related mathematical problems. They can also be called classical or
   conventional algorithms.</t>
      <t><em>Post-Quantum Asymmetric Cryptographic Algorithm</em>:  An asymmetric
cryptographic algorithm that is intended to be secure against
attacks using quantum computers as well as classical computers.
They can also be called quantum-resistant or quantum-safe algorithms.</t>
      <t>As with all cryptography, it always remains the case that attacks, either quantum or classical, may be found against post-quantum algorithms.  Therefore it should not be assumed that just because an algorithm is designed to provide post-quantum security it will not be compromised.  Should an attack be found against a post-quantum algorithm, it is commonly still referred to as a post-quantum algorithm as they were designed to protect against an adversary with access to a CRQC and the labels are referring to the designed or desired properties.</t>
      <t><em>IND-CCA2</em>: Indistinguishability under Adaptive Chosen-Ciphertext Attack. It is the standard security notion for KEM schemes.</t>
      <t><em>EUF-CMA</em>: Existential Unforgeability under Chosen-Message Attack. It is the standard security notion for digital signature schemes.</t>
      <t><em>SUF-CMA</em>: Strong Existential Unforgeability under Chosen-Message Attack. It is a stronger security notion than EUF-CMA.</t>
    </section>
    <section anchor="parameter-sizes">
      <name>Parameter Sizes</name>
      <t>This section is divided into two different subsections, one focused on Key Encapsulation Mechanism, and the other on signature schemes.</t>
      <t>The "claimed security level" in each table refers to the NIST Post-Quantum Cryptography Evaluation Criteria. We summarize this classification in <xref target="tab-security-level"/> below. Additional details are available at <xref target="IR.8547"/>.</t>
      <table anchor="tab-security-level">
        <name>NIST Post-Quantum Cryptography Classification</name>
        <thead>
          <tr>
            <th align="left">Security Category</th>
            <th align="left">Attack Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">Key search on a block cipher with a 128-bit key</td>
            <td align="left">AES-128</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">Collision search on a 256-bit hash function</td>
            <td align="left">SHA-256</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">Key search on a block cipher with a 192-bit key</td>
            <td align="left">AES-192</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">Collision search on a 384-bit hash function</td>
            <td align="left">SHA3-384</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">Key search on a block cipher with a 256-bit key</td>
            <td align="left">AES-256</td>
          </tr>
        </tbody>
      </table>
      <section anchor="key-encapsulation-mechanism-kem-schemes">
        <name>Key Encapsulation Mechanism (KEM) Schemes</name>
        <t>A Key Encapsulation Mechanism (KEM) is a cryptographic primitive that can be used as a building block within a broader key establishment protocol. Therefore, while KEMs are often employed to achieve the same end goal as a traditional key exchange, they do not, by themselves, define the interactive procedures, message flows, or authentication steps that a full key exchange protocol requires.</t>
        <t>This distinction is particularly relevant for implementers and developers to avoid confusion:</t>
        <ul spacing="normal">
          <li>
            <t>A KEM provides the mechanism for securely deriving and encapsulating a shared secret.</t>
          </li>
          <li>
            <t>A Key Exchange Protocol defines the interaction between parties that uses one or more KEMs (and possibly other primitives) to securely establish a secret key in context.</t>
          </li>
        </ul>
        <section anchor="ml-kem">
          <name>ML-KEM</name>
          <t>ML-KEM, formerly known as CRYSTALS-Kyber, is a structured lattice-based KEM, the first PQC KEM standardized by NIST. The security of ML-KEM is based on the computational hardness of the Module Learning with Errors problem.</t>
          <t>NIST recommends Security Level 3 by default, and European security agencies recommend a minimum of the same security level.</t>
          <t>The NIST specification of ML-KEM is available at <xref target="MLKEM.SPEC"/>.</t>
          <table anchor="tab-mlkem">
            <name>ML-KEM Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ML-KEM-512</td>
                <td align="left">800</td>
                <td align="left">1632</td>
                <td align="left">768</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">ML-KEM-768</td>
                <td align="left">1184</td>
                <td align="left">2400</td>
                <td align="left">1088</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ML-KEM-1024</td>
                <td align="left">1568</td>
                <td align="left">2168</td>
                <td align="left">1568</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
          <t><xref target="MLKEM.SPEC"/> also allows to use a 64-bytes seed to represent the private key.</t>
        </section>
        <section anchor="frodokem">
          <name>FrodoKEM</name>
          <t>FrodoKEM is a lattice-based KEM whose security is based on the plain Learning with Errors (LWE) hardness assumption, unlike ML-KEM which is based on structured lattices. This makes FrodoKEM a more conservative KEM scheme.</t>
          <t>It is considered for standardization by ISO, and it is recommended by European security agencies.</t>
          <t>Each security level allows the choice between AES and SHAKE as the underlying symmetric primitive. The AES variant is beneficial on devices with AES hardware acceleration, while the SHAKE variant generally provides better performance if hardware acceleration is not available.</t>
          <t>The FrodoKEM specification is available at <xref target="FRODOKEM.SPEC"/>.</t>
          <table anchor="tab-frodokem">
            <name>FrodoKEM Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">FrodoKEM-640-AES</td>
                <td align="left">9616</td>
                <td align="left">19888</td>
                <td align="left">9720</td>
                <td align="left">16</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-640-SHAKE</td>
                <td align="left">9616</td>
                <td align="left">19888</td>
                <td align="left">9720</td>
                <td align="left">16</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-976-AES</td>
                <td align="left">15632</td>
                <td align="left">31296</td>
                <td align="left">15744</td>
                <td align="left">24</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-976-SHAKE</td>
                <td align="left">15632</td>
                <td align="left">31296</td>
                <td align="left">15744</td>
                <td align="left">24</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-1344-AES</td>
                <td align="left">21520</td>
                <td align="left">43088</td>
                <td align="left">21632</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">FrodoKEM-1344-SHAKE</td>
                <td align="left">21520</td>
                <td align="left">43088</td>
                <td align="left">21632</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="classic-mceliece">
          <name>Classic McEliece</name>
          <t>Classic McEliece is a conservative, code-based KEM, based on the original McEliece cryptosystem from 1978.</t>
          <t>It requires larger key sizes compared to the other KEMs discussed here, but relatively small ciphertext sizes.</t>
          <t>Each security level includes an 'f' variant that is more complex internally than the 'non-f' variant but enables faster key generation.</t>
          <t>It has withstood extensive cryptanalysis over several decades, and several European security agencies have expressed confidence in its security. It is considered for standardization by ISO.</t>
          <t>The Classic McEliece specification is available at <xref target="CLASSICMCELIECE.SPEC"/>.</t>
          <table anchor="tab-cme">
            <name>Classic-McEliece Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Classic-McEliece-348864</td>
                <td align="left">261120</td>
                <td align="left">6492</td>
                <td align="left">96</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-348864f</td>
                <td align="left">261120</td>
                <td align="left">6492</td>
                <td align="left">96</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-460896</td>
                <td align="left">524160</td>
                <td align="left">13608</td>
                <td align="left">156</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-460896f</td>
                <td align="left">524160</td>
                <td align="left">13608</td>
                <td align="left">156</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6688128</td>
                <td align="left">1044992</td>
                <td align="left">13932</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6688128f</td>
                <td align="left">1044992</td>
                <td align="left">13932</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6960119</td>
                <td align="left">1047319</td>
                <td align="left">13948</td>
                <td align="left">194</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-6960119f</td>
                <td align="left">1047319</td>
                <td align="left">13948</td>
                <td align="left">194</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-8192128</td>
                <td align="left">1357824</td>
                <td align="left">14120</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Classic-McEliece-8192128f</td>
                <td align="left">1357824</td>
                <td align="left">14120</td>
                <td align="left">208</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="hqc">
          <name>HQC</name>
          <t>HQC is a code-based KEM relying on the decisional Quasi-Cyclic Syndrome Decoding (QCSD) hardness assumption.</t>
          <t>HQC offers small public key and ciphertext sizes, although these are larger than those of ML-KEM.</t>
          <t>It will be standardized by NIST.</t>
          <t>The HQC specification is available at <xref target="HQC.SPEC"/>.</t>
          <table anchor="tab-hqc">
            <name>HQC Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">HQC-128</td>
                <td align="left">2249</td>
                <td align="left">2305</td>
                <td align="left">4433</td>
                <td align="left">64</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">HQC-192</td>
                <td align="left">4522</td>
                <td align="left">4586</td>
                <td align="left">8978</td>
                <td align="left">64</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">HQC-256</td>
                <td align="left">7245</td>
                <td align="left">7317</td>
                <td align="left">14421</td>
                <td align="left">64</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="ntru">
          <name>NTRU</name>
          <t>NTRU is a structured lattice-based KEM. It has a long, well-established history and has been widely analyzed.</t>
          <t>It is considered for standardization by ISO.</t>
          <t>The NTRU specification is available at <xref target="NTRU.SPEC"/>.</t>
          <table anchor="tab-ntru">
            <name>NTRU Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Ciphertext</th>
                <th align="left">Shared Secret</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ntruhps2048509</td>
                <td align="left">699</td>
                <td align="left">935</td>
                <td align="left">699</td>
                <td align="left">32</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">ntruhps2048677</td>
                <td align="left">930</td>
                <td align="left">1235</td>
                <td align="left">930</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ntruhps4096821</td>
                <td align="left">1230</td>
                <td align="left">1592</td>
                <td align="left">1230</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">ntruhrss701</td>
                <td align="left">1138</td>
                <td align="left">1452</td>
                <td align="left">1138</td>
                <td align="left">32</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ntruhrss1373</td>
                <td align="left">2401</td>
                <td align="left">2983</td>
                <td align="left">2401</td>
                <td align="left">32</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="signature-schemes">
        <name>Signature Schemes</name>
        <t>Digital signatures are cryptographic primitives used to provide authenticity, integrity, and non-repudiation of messages or data.</t>
        <t>In the context of post-quantum cryptography, signature schemes are designed to remain secure against adversaries with quantum computing capabilities. They can be used in various scenarios, including authentication of protocol messages, code signing, and certificates, and are often combined with key establishment mechanisms in secure communication protocols.</t>
        <section anchor="ml-dsa">
          <name>ML-DSA</name>
          <t>ML-DSA, formerly known as CRYSTALS-Dilithium, is a structured lattice-based signature scheme, now standardized by NIST. The security of ML-DSA is based on the computational hardness of the Module Learning with Errors problem as well as the SelfTargetMSIS problem, a variant of the Module Short Integer Solution problem.</t>
          <t>European security agencies recommend at least Security Level 3.</t>
          <t>The NIST specification of ML-DSA is available at <xref target="MLDSA.SPEC"/>.</t>
          <table anchor="tab-mldsa">
            <name>ML-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ML-DSA-44</td>
                <td align="left">1312</td>
                <td align="left">2560</td>
                <td align="left">2420</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">ML-DSA-65</td>
                <td align="left">1952</td>
                <td align="left">4032</td>
                <td align="left">3309</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">ML-DSA-87</td>
                <td align="left">2592</td>
                <td align="left">4896</td>
                <td align="left">4627</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
          <t><xref target="MLDSA.SPEC"/> also allows to use a 32-bytes seed to represent the private key.</t>
        </section>
        <section anchor="fn-dsa">
          <name>FN-DSA</name>
          <t>FN-DSA, formerly known as Falcon, is a lattice-based signature scheme that was selected by NIST for standardization.</t>
          <t>It relies on floating-point arithmetic, which is considered challenging to implement securely, especially with respect to side-channel attacks.</t>
          <t>The Falcon specification is available at <xref target="FNDSA.SPEC"/>.</t>
          <table anchor="tab-fndsa">
            <name>FN-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Falcon-512</td>
                <td align="left">897</td>
                <td align="left">1281</td>
                <td align="left">752</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Falcon-1024</td>
                <td align="left">1793</td>
                <td align="left">2305</td>
                <td align="left">1462</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Falcon-padded-512</td>
                <td align="left">897</td>
                <td align="left">1281</td>
                <td align="left">666</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Falcon-padded-1024</td>
                <td align="left">1793</td>
                <td align="left">2305</td>
                <td align="left">1280</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="slh-dsa">
          <name>SLH-DSA</name>
          <t>SLH-DSA, formerly known as SPHINCS+, is a stateless hash-based signature scheme now standardized by NIST.</t>
          <t>Each security level offers two possible hash function families (SHA-2 or SHAKE) and for both, two specific variants. The 's' variant has smaller signature sizes, while the 'f' variant has faster signature generation.</t>
          <t>The NIST specification of SLH-DSA is available at <xref target="SLHDSA.SPEC"/>.</t>
          <table anchor="tab-slhdsa">
            <name>SLH-DSA Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">SLH-DSA-SHA2-128s</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">7856</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-128s</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">7856</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-128f</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">17088</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-128f</td>
                <td align="left">32</td>
                <td align="left">64</td>
                <td align="left">17088</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-192s</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">16224</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-192s</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">16224</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-192f</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">35664</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-192f</td>
                <td align="left">48</td>
                <td align="left">96</td>
                <td align="left">35664</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-256s</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">29762</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-256s</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">29762</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHA2-256f</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">49856</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">SLH-DSA-SHAKE-256f</td>
                <td align="left">64</td>
                <td align="left">128</td>
                <td align="left">49856</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="lms">
          <name>LMS</name>
          <t>Leighton-Micali Signatures (LMS) is a stateful hash-based signature scheme that uses LM-OTS for one-time signatures, and is based on Merkle hash trees.</t>
          <t>It requires careful state management. <xref target="I-D.draft-ietf-pquip-hbs-state"/> provides guidance and security considerations on state management for stateful hash-based signature schemes.</t>
          <t>The NIST specification of LMS is available at <xref target="LMS.SPEC"/>.</t>
          <section anchor="lms-with-sha-256">
            <name>LMS with SHA-256</name>
            <t>The signatures' sizes for the LMS_SHA256_M32_H{5, 10, 15, 20, 25} signature scheme depend on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256_M32_H{5, 10, 15, 20, 25} are given in a 4-element array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table anchor="tab-lms-sha256">
              <name>LMS with SHA256 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed Security Level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W1</td>
                  <td align="left">56</td>
                  <td align="left">8504</td>
                  <td align="left">8516</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W2</td>
                  <td align="left">56</td>
                  <td align="left">4280</td>
                  <td align="left">4292</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W4</td>
                  <td align="left">56</td>
                  <td align="left">2168</td>
                  <td align="left">2180</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N32_W8</td>
                  <td align="left">56</td>
                  <td align="left">1112</td>
                  <td align="left">1124</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[1296, 2352, 4464, 8688]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[1456, 2512, 4624, 8848]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1616, 2672, 4784, 9008]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1776, 2832, 4944, 9168]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M32_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1936, 2992, 5104, 9328]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-sha-256192">
            <name>LMS with SHA-256/192</name>
            <t>The signatures' sizes for the LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} signature scheme depend on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} are given in a 4-element array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHA256/192 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed Security Level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W1</td>
                  <td align="left">56</td>
                  <td align="left">4824</td>
                  <td align="left">4828</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W2</td>
                  <td align="left">56</td>
                  <td align="left">2448</td>
                  <td align="left">2452</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W4</td>
                  <td align="left">56</td>
                  <td align="left">1248</td>
                  <td align="left">1251</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHA256_N24_W8</td>
                  <td align="left">56</td>
                  <td align="left">648</td>
                  <td align="left">652</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[784, 1384, 2584, 4960]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[904, 1504, 2704, 5080]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1024, 1624, 2824, 5200]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1144, 1744, 2944, 5320]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHA256_M24_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1264, 1864, 3064, 5440]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-shake256256">
            <name>LMS with SHAKE256/256</name>
            <t>The signatures' sizes for the LMS_SHA256_M32_H{5, 10, 15, 20, 25} signature scheme depend on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256_M32_H{5, 10, 15, 20, 25} are given in a 4-element array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHAKE256/256 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed Security Level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W1</td>
                  <td align="left">56</td>
                  <td align="left">8504</td>
                  <td align="left">8516</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W2</td>
                  <td align="left">56</td>
                  <td align="left">4280</td>
                  <td align="left">4292</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W4</td>
                  <td align="left">56</td>
                  <td align="left">2168</td>
                  <td align="left">2180</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N32_W8</td>
                  <td align="left">56</td>
                  <td align="left">1112</td>
                  <td align="left">1124</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[1296, 2352, 4464, 8688]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[1456, 2512, 4624, 8848]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1616, 2672, 4784, 9008]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1776, 2832, 4944, 9168]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M32_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1936, 2992, 5104, 9328]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
          <section anchor="lms-with-shake256192">
            <name>LMS with SHAKE256/192</name>
            <t>The signatures' sizes for the LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} signature scheme depend on the choice of the underlying LMOTS scheme and in particular on the value of the Winternitz parameter W. Therefore, the signatures' sizes of LMS_SHA256/192_M24_H{5, 10, 15, 20, 25} are given in a 4-element array where values correspond to the value of W = 8, 4, 2, 1 in that order.</t>
            <table>
              <name>LMS with SHAKE256/192 Parameter Sizes (in bytes)</name>
              <thead>
                <tr>
                  <th align="left">Scheme</th>
                  <th align="left">Public Key</th>
                  <th align="left">Private Key</th>
                  <th align="left">Signature</th>
                  <th align="left">Claimed Security Level</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W1</td>
                  <td align="left">56</td>
                  <td align="left">4824</td>
                  <td align="left">4828</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W2</td>
                  <td align="left">56</td>
                  <td align="left">2448</td>
                  <td align="left">2452</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W4</td>
                  <td align="left">56</td>
                  <td align="left">1248</td>
                  <td align="left">1252</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMOTS_SHAKE_N24_W8</td>
                  <td align="left">56</td>
                  <td align="left">648</td>
                  <td align="left">652</td>
                  <td align="left">x</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H5</td>
                  <td align="left">56</td>
                  <td align="left">1796</td>
                  <td align="left">[784, 1384, 2584, 4960]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H10</td>
                  <td align="left">56</td>
                  <td align="left">57348</td>
                  <td align="left">[904, 1504, 2704, 5080]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H15</td>
                  <td align="left">56</td>
                  <td align="left">1835012</td>
                  <td align="left">[1024, 1624, 2824, 5200]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H20</td>
                  <td align="left">56</td>
                  <td align="left">58720260</td>
                  <td align="left">[1144, 1744, 2944, 5320]</td>
                  <td align="left">5</td>
                </tr>
                <tr>
                  <td align="left">LMS_SHAKE_M24_H25</td>
                  <td align="left">56</td>
                  <td align="left">1879048196</td>
                  <td align="left">[1264, 1864, 3064, 5440]</td>
                  <td align="left">5</td>
                </tr>
              </tbody>
            </table>
          </section>
        </section>
        <section anchor="xmss-xmssmt">
          <name>XMSS / XMSS^MT</name>
          <t>The eXtended Merkle Signature Scheme (XMSS) is a stateful hash-based signature scheme that uses WOTS+ for one-time signatures, and is based on Merkle hash trees. XMSS^MT is a variant that has multiple hash trees.</t>
          <t>It requires careful state management. <xref target="I-D.draft-ietf-pquip-hbs-state"/> provides guidance and security considerations on state management for stateful hash-based signature schemes.</t>
          <t>The NIST specification of XMSS is available at <xref target="XMSS.SPEC"/>.</t>
          <table anchor="tab-xmss">
            <name>XMSS Parameter Sizes (in bytes)</name>
            <thead>
              <tr>
                <th align="left">Scheme</th>
                <th align="left">Public Key</th>
                <th align="left">Private Key</th>
                <th align="left">Signature</th>
                <th align="left">Claimed Security Level</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">XMSS-SHA2_10_256</td>
                <td align="left">64</td>
                <td align="left">1793</td>
                <td align="left">2500</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_16_256</td>
                <td align="left">64</td>
                <td align="left">2093</td>
                <td align="left">2692</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_20_256</td>
                <td align="left">64</td>
                <td align="left">2573</td>
                <td align="left">2820</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_20/2_256</td>
                <td align="left">64</td>
                <td align="left">5998</td>
                <td align="left">4963</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_20/4_256</td>
                <td align="left">64</td>
                <td align="left">10938</td>
                <td align="left">9251</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/2_256</td>
                <td align="left">64</td>
                <td align="left">9600</td>
                <td align="left">5605</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/4_256</td>
                <td align="left">64</td>
                <td align="left">15252</td>
                <td align="left">9893</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_40/8_256</td>
                <td align="left">64</td>
                <td align="left">24516</td>
                <td align="left">18469</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/3_256</td>
                <td align="left">64</td>
                <td align="left">16629</td>
                <td align="left">8392</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/6_256</td>
                <td align="left">64</td>
                <td align="left">24507</td>
                <td align="left">14824</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHA2_60/12_256</td>
                <td align="left">64</td>
                <td align="left">38095</td>
                <td align="left">27688</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_10_192</td>
                <td align="left">48</td>
                <td align="left">1053</td>
                <td align="left">1492</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_16_192</td>
                <td align="left">48</td>
                <td align="left">1605</td>
                <td align="left">1636</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHA2_20_192</td>
                <td align="left">48</td>
                <td align="left">1973</td>
                <td align="left">1732</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_10_256</td>
                <td align="left">64</td>
                <td align="left">1373</td>
                <td align="left">2500</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_16_256</td>
                <td align="left">64</td>
                <td align="left">2093</td>
                <td align="left">2692</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_20_256</td>
                <td align="left">64</td>
                <td align="left">2573</td>
                <td align="left">2820</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_20/2_256</td>
                <td align="left">64</td>
                <td align="left">5998</td>
                <td align="left">4963</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_20/4_256</td>
                <td align="left">64</td>
                <td align="left">10938</td>
                <td align="left">9251</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/2_256</td>
                <td align="left">64</td>
                <td align="left">9600</td>
                <td align="left">5605</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/4_256</td>
                <td align="left">64</td>
                <td align="left">15252</td>
                <td align="left">9893</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_40/8_256</td>
                <td align="left">64</td>
                <td align="left">24516</td>
                <td align="left">18469</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/3_256</td>
                <td align="left">64</td>
                <td align="left">24516</td>
                <td align="left">8392</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/6_256</td>
                <td align="left">64</td>
                <td align="left">24507</td>
                <td align="left">14824</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSSMT-SHAKE256_60/12_256</td>
                <td align="left">64</td>
                <td align="left">38095</td>
                <td align="left">27688</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_10_192</td>
                <td align="left">48</td>
                <td align="left">1053</td>
                <td align="left">1492</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_16_192</td>
                <td align="left">48</td>
                <td align="left">1605</td>
                <td align="left">1636</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">XMSS-SHAKE256_20_192</td>
                <td align="left">48</td>
                <td align="left">1973</td>
                <td align="left">1732</td>
                <td align="left">5</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-properties">
      <name>Security Properties</name>
      <section anchor="quantum-vulnerable-asymmetric-cryptography">
        <name>Quantum-Vulnerable Asymmetric Cryptography</name>
        <t><xref target="tab-vulne"/> gives a list of asymmetric cryptographic schemes that are vulnerable to quantum computers and are planned to be deprecated and/or disallowed in the future by various organizations or security agencies. In particular, NIST provides deprecation and disallowance timelines in <xref target="IR.8547"/>.</t>
        <t>The EU PQC Workstream also published its roadmap for the transition to post-quantum cryptography in <xref target="EU.Roadmap"/>. It distinguishes between low, medium and high quantum risk levels, and recommends completing the PQC transition for high-risk use cases before 2031, for medium-risk use cases before 2036, and for low-risk use cases before 2036, as much as feasible.</t>
        <table anchor="tab-vulne">
          <name>Quantum-Vulnerable Asymmetric Cryptographic Schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Disallowed (NIST)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ECDSA</td>
              <td align="left">Discrete Logarithm</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">EdDSA</td>
              <td align="left">Discrete Logarithm</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">RSA</td>
              <td align="left">Factorisation</td>
              <td align="left">after 2035</td>
            </tr>
            <tr>
              <td align="left">(EC)DH</td>
              <td align="left">Decisional Diffie Hellman</td>
              <td align="left">after 2035</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="quantum-safe-asymmetric-cryptography">
        <name>Quantum-Safe Asymmetric Cryptography</name>
        <t><xref target="tab-secu-kem"/> gives a brief summary of the security properties of various KEM algorithms.</t>
        <table anchor="tab-secu-kem">
          <name>Properties of KEM schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">SDO</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Security Model</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ML-KEM</td>
              <td align="left">NIST</td>
              <td align="left">Module LWE</td>
              <td align="left">IND-CCA-2</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">FrodoKEM</td>
              <td align="left">ISO</td>
              <td align="left">Unstructured LWE</td>
              <td align="left">IND-CCA2</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">HQC</td>
              <td align="left">NIST</td>
              <td align="left">Decisional Quasi-Cyclic Syndrome Decoding Problem</td>
              <td align="left">IND-CCA2</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">Classic McEliece</td>
              <td align="left">ISO</td>
              <td align="left">Syndrome Decoding Problem, Goppa code recovery</td>
              <td align="left">IND-CCA2</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">NTRU</td>
              <td align="left">ISO</td>
              <td align="left">NTRU</td>
              <td align="left">IND-CCA2</td>
              <td align="left">xxx</td>
            </tr>
          </tbody>
        </table>
        <t>FrodoKEM is believed to have conservative security compared to schemes based on structured lattices like ML-KEM or NTRU.</t>
        <t><xref target="tab-secu-sig"/> gives a summary of the security properties of different signature algorithms.</t>
        <table anchor="tab-secu-sig">
          <name>Properties of signatures schemes</name>
          <thead>
            <tr>
              <th align="left">Scheme</th>
              <th align="left">SDO</th>
              <th align="left">Hardness assumption</th>
              <th align="left">Security Model</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ML-DSA</td>
              <td align="left">NIST</td>
              <td align="left">Module LWE, SelfTargetMSIS</td>
              <td align="left">SUF-CMA</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">FN-DSA</td>
              <td align="left">NIST</td>
              <td align="left">SIS over NTRU lattices</td>
              <td align="left">EUF-CMA</td>
              <td align="left">Uses floating point arithmetic</td>
            </tr>
            <tr>
              <td align="left">SLH-DSA</td>
              <td align="left">NIST</td>
              <td align="left">Second-preimage resistance</td>
              <td align="left">SUF-CMA (*)</td>
              <td align="left">xxx</td>
            </tr>
            <tr>
              <td align="left">LMS</td>
              <td align="left">NIST</td>
              <td align="left">Collision resistance</td>
              <td align="left">SUF-CMA (*)</td>
              <td align="left">Need state management</td>
            </tr>
            <tr>
              <td align="left">XMSS</td>
              <td align="left">NIST</td>
              <td align="left">Collision resistance</td>
              <td align="left">SUF-CMA (*)</td>
              <td align="left">Need state management</td>
            </tr>
          </tbody>
        </table>
        <t>(*) There is no known attack on the SUF-CMA security of those schemes, which are widely believed to be SUF-CMA secure. However, no formal proof exists yet.</t>
        <t>Hash-based signature schemes such as SLH-DSA, LMS, and XMSS are believed to offer more conservative security compared to lattice-based schemes like ML-DSA or FN-DSA.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA action.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-pquip-pqt-hybrid-terminology-04">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="I-D.draft-ietf-pquip-hbs-state">
          <front>
            <title>Hash-based Signatures: State and Backup Management</title>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization>PQShield</organization>
            </author>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Stefan Kölbl" initials="S." surname="Kölbl">
              <organization>Google</organization>
            </author>
            <author fullname="Jim Goodman" initials="J." surname="Goodman">
              <organization>Crypto4A Technologies</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="17" month="June" year="2025"/>
            <abstract>
              <t>   Stateful Hash-Based Signature Schemes (S-HBS) such as LMS, HSS, XMSS
   and XMSS^MT combine Merkle trees with One-Time Signatures (OTS) to
   provide signatures that are resistant against attacks using large-
   scale quantum computers.  Unlike conventional stateless digital
   signature schemes, S-HBS have a state to keep track of which OTS keys
   have been used, as double-signing with the same OTS key allows
   forgeries.

   This document provides guidance and documents security considerations
   for the operational and technical aspects of deploying systems that
   rely on S-HBS.  Management of the state of the S-HBS, including any
   handling of redundant key material, is a sensitive topic, and we
   discuss some approaches to handle the associated challenges.  We also
   describe the challenges that need to be resolved before certain
   approaches should be considered.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hbs-state-00"/>
        </reference>
        <reference anchor="MLKEM.SPEC" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="FRODOKEM.SPEC" target="https://frodokem.org/files/FrodoKEM_standard_proposal_20241205.pdf">
          <front>
            <title>FrodoKEM: Learning With Errors Key Encapsulation</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="CLASSICMCELIECE.SPEC" target="https://classic.mceliece.org/mceliece-spec-20221023.pdf">
          <front>
            <title>Classic McEliece: conservative code-based cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="October"/>
          </front>
        </reference>
        <reference anchor="HQC.SPEC" target="https://pqc-hqc.org/doc/hqc-specification_2025-02-19.pdf">
          <front>
            <title>Hamming Quasi-Cyclic (HQC)</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="NTRU.SPEC" target="https://www.ietf.org/id/draft-fluhrer-cfrg-ntru-02.html">
          <front>
            <title>NTRU Key Encapsulation</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="MLDSA.SPEC" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="FNDSA.SPEC" target="https://falcon-sign.info/falcon.pdf">
          <front>
            <title>Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="SLHDSA.SPEC" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="LMS.SPEC" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="XMSS.SPEC" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">
          <front>
            <title>Recommendation for Stateful Hash-Based Signature Schemes</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="IR.8547" target="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf">
          <front>
            <title>Transition to Post-Quantum Cryptography Standards</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="EU.Roadmap" target="https://digital-strategy.ec.europa.eu/en/library/coordinated-implementation-roadmap-transition-post-quantum-cryptography">
          <front>
            <title>A Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography</title>
            <author>
              <organization>EU PQC Workstream</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
