PQ Crypto Registry

SLH-DSA

digital-signature
Standardization
Body
NIST
Reference
FIPS 205
Status
standard
Security Properties
Hardness Assumption
Hash function second-preimage resistance
Security Notion
EUF-CMA
Deterministic
No
Statefulness
stateless

Tags

hash-based
fips-205
digital-signature
stateless
Parameter Sets & Sizes
NameNIST LevelPK (bytes)SK (bytes)Sig (bytes)
SLH-DSA-SHA2-128s132647,856
SLH-DSA-SHA2-128f1326417,088
SLH-DSA-SHA2-192s3489616,224
SLH-DSA-SHA2-192f3489635,664
SLH-DSA-SHA2-256s56412829,792
SLH-DSA-SHA2-256f56412849,856
SLH-DSA-SHAKE-128s132647,856
SLH-DSA-SHAKE-128f1326417,088
SLH-DSA-SHAKE-192s3489616,224
SLH-DSA-SHAKE-192f3489635,664
SLH-DSA-SHAKE-256s56412829,792
SLH-DSA-SHAKE-256f56412849,856
Performance

Relative Speed

Keygenfast
Signslow
Verifymedium

No benchmarks yet.

Risk Assessment
Assumption: low
Implementation: low
Side-channel: low
Capabilities
hedged-signing
hardware-friendly
hybrid-mode
Implementations
NameLanguageAuditedLink
liboqsC
Yes
pqcryptoRustNo
sphincsplus (ref)CNo
go-slh-dsaGoNo

Overview

SLH-DSA (formerly SPHINCS+) is a stateless hash-based digital signature scheme standardized in FIPS 205. It provides post-quantum digital signatures whose security relies solely on the properties of cryptographic hash functions, making it the most conservative choice among the NIST post-quantum signature standards. FIPS 205 specifies 12 parameter sets across three security levels, with both SHA-2 and SHAKE instantiations and a choice of small-signature ("s") or fast-signing ("f") variants.

Security basis

SLH-DSA's security reduces to standard hash function properties: second-preimage resistance, pseudorandomness, and related multi-target variants. These assumptions are among the best-understood in all of cryptography, with hash function security studied intensively since the 1990s. Because no algebraic structure is involved, there is no known quantum speedup beyond generic Grover search (which at most halves the effective security level). This makes SLH-DSA a natural fallback if lattice assumptions are ever broken.

Key characteristics

  • Stateless — unlike XMSS or LMS, SLH-DSA does not require signers to track which one-time keys have been used, greatly simplifying deployment and key management.
  • Minimal assumptions — security depends only on hash function properties, not on the hardness of any algebraic problem.
  • Tiny keys, large signatures — public keys are 32 to 64 bytes, but signatures range from 7,856 bytes (SLH-DSA-SHA2-128s) up to 49,856 bytes (SLH-DSA-SHAKE-256f).
  • Speed-size tradeoff — the "s" (small) variants produce shorter signatures with slower signing; the "f" (fast) variants sign quickly but produce signatures roughly 2x larger.
  • Hedged signing — FIPS 205 supports randomized signing to protect against fault attacks.

Considerations

The primary deployment constraint is signature size. Even the smallest parameter set (SLH-DSA-SHA2-128s at 7,856 bytes) produces signatures an order of magnitude larger than ML-DSA or FN-DSA. This makes SLH-DSA unsuitable as a drop-in replacement in bandwidth-constrained protocols like TLS without careful protocol-level engineering. Signing performance for the "s" variants can also be slow, on the order of hundreds of milliseconds on commodity hardware. Implementations must protect the PRF computation over SK.seed against side-channel leakage, as a leak of this master seed compromises all signing keys in the hypertree. NIST is actively working on additional smaller parameter sets with reduced signature-per-key limits for constrained use cases.