Commercial National Security Algorithm Suite: Difference between revisions

Content deleted Content added
WikiCleanerBot (talk | contribs)
m v2.05b - Bot T20 CW#61 - Fix errors for CW project (Reference before punctuation)
Update to use NIST terminology for Kyber and Dilithium and point to final published specs
Line 18:
 
* [[Advanced Encryption Standard]] with 256 bit keys
* [[CRYSTALS-Kyber]]|Module-Lattice-Based andKey-Encapsulation [[LatticeMechanism Standard (ML-basedKEM aka cryptography|CRYSTALS-DilithiumKyber)]] with Levelparameter Vset parametersML-KEM-1024
* [[Lattice-based cryptography|Module-Lattice-Based Digital Signature Standard (ML-DSA aka CRYSTALS-Dilithium)]] with parameter set ML-DSA-87
* [[SHA-2]] with 384 or 512 bits
* [[eXtended Merkle Signature Scheme]] (XMSS) and [[Leighton-Micali Signatures]] (LMS) with all parameters approved, with SHA256/192 recommended
Line 43 ⟶ 44:
| Use 256-bit keys for all classification levels.
|-
| Module-Lattice-Based Key-Encapsulation Mechanism Standard (ML-KEM aka CRYSTALS-Kyber)
| CRYSTALS-Kyber
| Asymmetric algorithm for key establishment
| [[doi:10.6028/NIST.FIPS.203|FIPS PUB 203]]
| TBD
| Use LevelML-KEM-1024 Vparameter parametersset for all classification levels.
|-
| Module-Lattice-Based Digital Signature Standard (aka CRYSTALS-Dilithium)
| Asymmetric algorithm for digital signatures
| [[doi:10.6028/NIST.FIPS.204|FIPS PUB 204]]
| TBD
| Use LevelML-DSA-87 Vparameter parametersset for all classification levels.
|-
| Secure Hash Algorithm (SHA)