FIPS 205 includes in total 12 algorithms for three different security levels, two options for the underlying hash standards (SHA-2 or SHAKE-256), and either relatively small signatures or fast signing. The announced winners of Round 3 included also a fourth algorithm called FALCON, which is ano...
The differences for the entire decapsulation at the three major security levels (1, 3, and 5) are \\(-4\\), \\(-2\\), and \\(+2\\%\\), respectively. Our benchmarking results demonstrate that our NEON-based implementations run on an Apple M1 ARM processor are comparable to those...
PQCgenKAT_sign_: App for generating NIST KAT. example_nistapi_: Example app using the NIST API. Test In the build directory, run:make testorctest. The test harness consists of the following units: KAT test: tests against the KAT files in theKATfolder -SQIsign_<level>_KAT Self-tests: ...
and validate results. The plethora of different algorithms has created a dire need for consistent requesting and reporting of test data and results. We also live in times of unprecedented levels of threats and exploits that require frequent product updates to fix defects and remove security vulnerabi...
However, even with the guidance from these important efforts, the danger is not gone: there are billions of old and new devices that need to transition to the PQC suite of algorithms, leading to a multidecade transition process that has to account for aspects such as ...
We also live in times of unprecedented levels of threats and exploits that require frequent product updates to fix defects and remove security vulnerabilities, which in turn requires much faster turnaround of validation updates than what the existing validation model allows. See the NIST Automated ...