SLH-DSA with SHAKE
Category 1s
NistyPQC.SLHDSA.Category1s_SHAKE.generate_keys
— Functiongenerate_keys([; seed])
Return a tuple (; sk, pk)
consisting of a secret key and the corresponding public key. The length of sk
will be 64 bytes and the length of pk
32 bytes.
For a deterministic result, a parameter seed = (; sk, prf, pk)
consisting of three components of 16 bytes each can be provided.
NistyPQC.SLHDSA.Category1s_SHAKE.sign_message
— Functionsign_message(msg, sk[; randomize])
Return a signature sig
computed from the message msg
based on the secret key sk
. The message msg
may consist of arbitrarily many bytes, whereas sk
must be a valid secret key of 64 bytes. The length of sig
will be 7856 bytes.
For a deterministic result, the optional parameter randomize
can be set to false
or to some given 16 bytes.
NistyPQC.SLHDSA.Category1s_SHAKE.verify_signature
— Functionverify_signature(msg, sig, pk)
Check whether sig
is a valid signature for msg
under the public key pk
. The message msg
and potential signature sig
may consist of arbitrarily many bytes, whereas pk
must be a valid public key of 32 bytes.
Category 1f
NistyPQC.SLHDSA.Category1f_SHAKE.generate_keys
— Functiongenerate_keys([; seed])
Return a tuple (; sk, pk)
consisting of a secret key and the corresponding public key. The length of sk
will be 64 bytes and the length of pk
32 bytes.
For a deterministic result, a parameter seed = (; sk, prf, pk)
consisting of three components of 16 bytes each can be provided.
NistyPQC.SLHDSA.Category1f_SHAKE.sign_message
— Functionsign_message(msg, sk[; randomize])
Return a signature sig
computed from the message msg
based on the secret key sk
. The message msg
may consist of arbitrarily many bytes, whereas sk
must be a valid secret key of 64 bytes. The length of sig
will be 17088 bytes.
For a deterministic result, the optional parameter randomize
can be set to false
or to some given 16 bytes.
NistyPQC.SLHDSA.Category1f_SHAKE.verify_signature
— Functionverify_signature(msg, sig, pk)
Check whether sig
is a valid signature for msg
under the public key pk
. The message msg
and potential signature sig
may consist of arbitrarily many bytes, whereas pk
must be a valid public key of 32 bytes.
Category 3s
NistyPQC.SLHDSA.Category3s_SHAKE.generate_keys
— Functiongenerate_keys([; seed])
Return a tuple (; sk, pk)
consisting of a secret key and the corresponding public key. The length of sk
will be 96 bytes and the length of pk
48 bytes.
For a deterministic result, a parameter seed = (; sk, prf, pk)
consisting of three components of 24 bytes each can be provided.
NistyPQC.SLHDSA.Category3s_SHAKE.sign_message
— Functionsign_message(msg, sk[; randomize])
Return a signature sig
computed from the message msg
based on the secret key sk
. The message msg
may consist of arbitrarily many bytes, whereas sk
must be a valid secret key of 96 bytes. The length of sig
will be 16224 bytes.
For a deterministic result, the optional parameter randomize
can be set to false
or to some given 24 bytes.
NistyPQC.SLHDSA.Category3s_SHAKE.verify_signature
— Functionverify_signature(msg, sig, pk)
Check whether sig
is a valid signature for msg
under the public key pk
. The message msg
and potential signature sig
may consist of arbitrarily many bytes, whereas pk
must be a valid public key of 48 bytes.
Category 3f
NistyPQC.SLHDSA.Category3f_SHAKE.generate_keys
— Functiongenerate_keys([; seed])
Return a tuple (; sk, pk)
consisting of a secret key and the corresponding public key. The length of sk
will be 96 bytes and the length of pk
48 bytes.
For a deterministic result, a parameter seed = (; sk, prf, pk)
consisting of three components of 24 bytes each can be provided.
NistyPQC.SLHDSA.Category3f_SHAKE.sign_message
— Functionsign_message(msg, sk[; randomize])
Return a signature sig
computed from the message msg
based on the secret key sk
. The message msg
may consist of arbitrarily many bytes, whereas sk
must be a valid secret key of 96 bytes. The length of sig
will be 35664 bytes.
For a deterministic result, the optional parameter randomize
can be set to false
or to some given 24 bytes.
NistyPQC.SLHDSA.Category3f_SHAKE.verify_signature
— Functionverify_signature(msg, sig, pk)
Check whether sig
is a valid signature for msg
under the public key pk
. The message msg
and potential signature sig
may consist of arbitrarily many bytes, whereas pk
must be a valid public key of 48 bytes.
Category 5s
NistyPQC.SLHDSA.Category5s_SHAKE.generate_keys
— Functiongenerate_keys([; seed])
Return a tuple (; sk, pk)
consisting of a secret key and the corresponding public key. The length of sk
will be 128 bytes and the length of pk
64 bytes.
For a deterministic result, a parameter seed = (; sk, prf, pk)
consisting of three components of 32 bytes each can be provided.
NistyPQC.SLHDSA.Category5s_SHAKE.sign_message
— Functionsign_message(msg, sk[; randomize])
Return a signature sig
computed from the message msg
based on the secret key sk
. The message msg
may consist of arbitrarily many bytes, whereas sk
must be a valid secret key of 128 bytes. The length of sig
will be 29792 bytes.
For a deterministic result, the optional parameter randomize
can be set to false
or to some given 32 bytes.
NistyPQC.SLHDSA.Category5s_SHAKE.verify_signature
— Functionverify_signature(msg, sig, pk)
Check whether sig
is a valid signature for msg
under the public key pk
. The message msg
and potential signature sig
may consist of arbitrarily many bytes, whereas pk
must be a valid public key of 64 bytes.
Category 5f
NistyPQC.SLHDSA.Category5f_SHAKE.generate_keys
— Functiongenerate_keys([; seed])
Return a tuple (; sk, pk)
consisting of a secret key and the corresponding public key. The length of sk
will be 128 bytes and the length of pk
64 bytes.
For a deterministic result, a parameter seed = (; sk, prf, pk)
consisting of three components of 32 bytes each can be provided.
NistyPQC.SLHDSA.Category5f_SHAKE.sign_message
— Functionsign_message(msg, sk[; randomize])
Return a signature sig
computed from the message msg
based on the secret key sk
. The message msg
may consist of arbitrarily many bytes, whereas sk
must be a valid secret key of 128 bytes. The length of sig
will be 49856 bytes.
For a deterministic result, the optional parameter randomize
can be set to false
or to some given 32 bytes.
NistyPQC.SLHDSA.Category5f_SHAKE.verify_signature
— Functionverify_signature(msg, sig, pk)
Check whether sig
is a valid signature for msg
under the public key pk
. The message msg
and potential signature sig
may consist of arbitrarily many bytes, whereas pk
must be a valid public key of 64 bytes.