NIST FIPS 204

ML-DSA Signature Engine

A silicon-hardened digital signature engine implementing NIST FIPS 204 across all three security levels. Shared architecture with ML-KEM for optimal area in combined quantum-safe deployments.

Multi-Level Security

Full support for ML-DSA-44, ML-DSA-65, and ML-DSA-87 covering NIST Category 2, 3, and 5 security levels. Runtime-selectable without hardware changes.

Side-Channel Protected

Comprehensive countermeasures including masking, operand shuffling, redundant computation checks, and constant-time rejection sampling to resist advanced physical attacks.

Shared Architecture

Common processing engines with the ML-KEM-768 Accelerator reduce combined silicon area by up to 40% when both key encapsulation and signatures are deployed together.

Quantum-Safe Digital Signatures in Silicon

The ML-DSA Signature Engine is a dedicated hardware accelerator for the NIST FIPS 204 Module-Lattice-Based Digital Signature Algorithm. It provides quantum-safe digital signatures through a purpose-built silicon datapath that handles key generation, signing, and verification entirely in hardware.

The engine shares its core processing components with the ML-KEM-768 Accelerator. In combined deployments where both key encapsulation and digital signatures are required, this shared architecture yields significant area savings without sacrificing performance.

ML-DSA uses a sophisticated signing paradigm that may internally retry to ensure signatures never leak information about the secret key. The hardware engine implements this process with constant-time behavior, executing the same number of cycles regardless of internal retries. Hedged signing combines deterministic and randomized approaches for defense-in-depth.

Quick Specifications

ParameterValue
AlgorithmML-DSA (FIPS 204)
Security LevelsCategory 2 / 3 / 5
VariantsML-DSA-44 / 65 / 87
Public Key1,312 – 2,592 bytes
Signature Size2,420 – 4,627 bytes
InterfaceStandard bus interface
Target Clock80 MHz

Core Capabilities

  • NIST FIPS 204 compliant across all three security levels
  • Complete key generation, signing, and verification in hardware
  • Hedged signing for combined deterministic and randomized protection
  • Shared processing architecture with ML-KEM for area-optimized deployments
  • Dedicated polynomial arithmetic engine with constant-time operation
  • Hardware hash acceleration for all internal computations
  • Standard bus interface for seamless SoC integration
  • Target throughput of 15,000+ signatures per second

Security Properties

  • Existential unforgeability under chosen message attack (EUF-CMA)
  • First-order masking countermeasures against power analysis
  • Operand shuffling to defeat electromagnetic emanation analysis
  • Redundant computation checks for fault injection resistance
  • Constant-time rejection sampling with fixed cycle count
  • Automatic zeroization of secret key material after operations
  • Data-independent memory access patterns throughout

Algorithm Parameters

ParameterML-DSA-44ML-DSA-65ML-DSA-87
NIST Security LevelCategory 2Category 3Category 5
Public Key Size1,312 bytes1,952 bytes2,592 bytes
Secret Key Size2,560 bytes4,032 bytes4,896 bytes
Signature Size2,420 bytes3,309 bytes4,627 bytes

Performance & Implementation

ParameterValue
InterfaceStandard register-mapped bus interface
Data Width32 bits
Target Clock Frequency80 MHz
Target Throughput~15,000 sign/sec (ML-DSA-44)
Key Generation Latency~0.2 ms @ 80 MHz
Signing Latency~0.5 ms @ 80 MHz (average)
Verification Latency~0.2 ms @ 80 MHz
VerificationNIST Known Answer Test vectors

Combined Deployment Savings

ConfigurationArea Benefit
Standalone ML-DSABaseline
ML-DSA + ML-KEM (shared engines)~40% reduction in shared logic
ML-DSA + ML-KEM (fully shared)~55% reduction in common components

Target Deployments

Firmware Signing
Secure Boot Chains
PKI & X.509 Certificates
Code Signing
Document Signing
Government & Defense
Authentication Tokens
Cloud HSM Integration

The ML-DSA Signature Engine replaces classical RSA and ECDSA signatures with quantum-safe alternatives, protecting firmware integrity, certificate hierarchies, and authentication tokens against future quantum attacks. With 15,000+ signatures per second, it meets the throughput demands of high-volume signing operations in cloud, enterprise, and embedded deployments.

Flexible Delivery Options

Choose the integration level that matches your design requirements.

Soft IP

Synthesizable Core

Complete source with verification suite, driver library, and comprehensive documentation. Includes shared architecture configuration for ML-KEM co-deployment. Maximum flexibility for any target technology.

Firm IP

Pre-Characterized Core

Optimized for target technology with timing models and physical abstractions. Pre-characterized for 80 MHz operation. Includes shared configuration for combined ML-KEM deployment.

Hard IP

Tapeout-Ready Layout

Fully validated physical implementation with complete signoff documentation. Available standalone or as a combined ML-DSA + ML-KEM macro with shared engines for maximum area efficiency.

Complementary Products

Security cores for complete quantum-safe deployments.

Ready to Integrate ML-DSA?

Contact our team for evaluation access, product documentation, or custom integration support for your quantum-safe signature requirements.