NIST FIPS 205

SLH-DSA Hash-Based Signature Engine

The most conservative post-quantum signature scheme, with security based solely on hash function properties. Stateless, minimal assumptions, and maximum long-term confidence for systems that must endure decades.

Stateless Design

No state management required between signing operations. Eliminates the risk of catastrophic key reuse from synchronization failures — ideal for distributed and redundant systems.

Conservative Security

Security rests entirely on hash function properties. No lattice assumptions, no algebraic structure to exploit — the most conservative quantum-safe signature available today.

Multiple Parameters

Six parameter sets enable fine-grained trade-offs between signature size and signing speed. Choose compact signatures for bandwidth-limited systems or fast variants for throughput-critical applications.

Maximum Confidence for Long-Lifecycle Systems

The SLH-DSA Hash-Based Signature Engine implements the NIST FIPS 205 Stateless Hash-Based Digital Signature Algorithm. It provides quantum-safe digital signatures whose security is based entirely on the collision resistance and preimage resistance of its underlying hash function — making it the most conservative choice for systems requiring the highest confidence in long-term security.

The engine features dedicated tree computation pipelines and one-time signature chain processors, all working under a top-level controller to compute the multi-layer tree-based signature structure. This pure hardware design requires no embedded processor — eliminating software attack surfaces and enabling deployment in the most sensitive environments.

With security that does not depend on the hardness of any algebraic problem, SLH-DSA provides essential insurance against mathematical breakthroughs that might weaken lattice-based schemes in the future. It is the signature of choice for root certificates, critical infrastructure, and any system with a 30+ year operational lifecycle.

Quick Specifications

ParameterValue
AlgorithmSLH-DSA (FIPS 205)
Security LevelsCategory 1 / 3 / 5
Parameter Sets6 (128s/f, 192s/f, 256s/f)
Public Key32 – 64 bytes
Signature Size7,856 – 49,856 bytes
Hash CoreSHA-256 or SHAKE-256
InterfaceStandard bus interface

Core Capabilities

  • NIST FIPS 205 compliant across all parameter sets
  • Stateless hash-based signatures — no state management between operations
  • Six parameter sets for flexible size/speed trade-offs
  • Selectable hash core: SHA-256 or SHAKE-256 variants
  • Dedicated tree computation pipeline with pipelined hash operations
  • Pure hardware design — no embedded processor or firmware required
  • Constant-time execution with data-independent memory access patterns
  • Standard bus interface for SoC integration

Security Properties

  • Security from hash function properties alone — minimal cryptographic assumptions
  • No algebraic structure to attack — immune to lattice and number-theoretic advances
  • Stateless design eliminates catastrophic state-reuse vulnerabilities
  • Constant-time hash computations prevent timing side channels
  • Deterministic signing with optional randomized variant for defense-in-depth
  • Automatic zeroization of intermediate computation values

Parameter Sets (SHA-256 Variants)

Parameter128s128f192s192f256s256f
Security LevelCat 1Cat 1Cat 3Cat 3Cat 5Cat 5
Public Key (bytes)323248486464
Secret Key (bytes)64649696128128
Signature (bytes)7,85617,08816,22435,66429,79249,856
Optimized ForSizeSpeedSizeSpeedSizeSpeed

Performance & Implementation

ParameterValue
InterfaceStandard register-mapped bus interface
Hash Core OptionsSHA-256 (default) or SHAKE-256
Target Clock Frequency80 MHz
Signing Latency (128f)~15 ms @ 80 MHz
Signing Latency (128s)~200 ms @ 80 MHz
Verification Latency (128f)~2 ms @ 80 MHz
VerificationNIST Known Answer Test vectors

Parameter Selection Guide

Use CaseRecommended
Bandwidth-limited systemsSLH-DSA-128s (7,856 B signature)
Fast signing requiredSLH-DSA-128f (17,088 B signature)
Government / CNSA 2.0SLH-DSA-256s (29,792 B signature)
High-throughput verificationSLH-DSA-128f or 192f
Maximum security marginSLH-DSA-256s or 256f

Target Deployments

Long-Lifecycle Systems (30+ years)
Root CA Certificates
Nuclear & Critical Infrastructure
Government Archival Systems
Satellite & Space Systems
Post-Quantum PKI Roots of Trust

SLH-DSA is the signature of choice for systems where the cost of failure is catastrophic and the operational lifecycle extends decades into the future. Root certificate authorities, nuclear facility control systems, satellite firmware, and government archives all benefit from hash-based signatures that make the absolute minimum cryptographic assumptions.

Flexible Delivery Options

Choose the integration level that matches your design requirements.

Soft IP

Synthesizable Core

Complete source with verification suite, driver library, and documentation. Configurable for SHA-256 or SHAKE-256 hash core at build time. Maximum portability across target technologies.

Firm IP

Pre-Characterized Core

Optimized for target technology with timing models and physical abstractions. Pre-characterized for 80 MHz with both SHA-256 and SHAKE-256 variants available.

Hard IP

Tapeout-Ready Layout

Fully validated physical implementation with complete signoff documentation. Available in both SHA-256 and SHAKE-256 configurations.

Complementary Products

Signature and security cores for comprehensive quantum-safe deployments.

Ready for Conservative Quantum-Safe Signatures?

Contact our team for evaluation access, product documentation, or custom integration support for your long-lifecycle security requirements.