EVALUATION AND COMPARISON OF CRYPTOGRAPHIC DIGITAL SIGNATURE TRANSFORMATIONS OF THE ADDITIONAL NIST COMPETITION «DIGITAL SIGNATURE SCHEMES»

Keywords: post-quantum cryptography, NIST PQC, quantum-resistant, digital signature, quantum safe

Abstract

 In the modern world, the development of quantum computing threatens classical cryptographic algorithms, in particular RSA, ECDSA and DSA, which are used to ensure digital security. This creates a need to develop post-quantum cryptographic solutions that can be resistance under quantum computers attacks. Stable digital signature algorithms are especially important, as they provide authentication, integrity and non-repudiation of information in financial, legal and government systems. The article analyzes and compares cryptographic digital signature schemes participating in the NIST supplementary competition “Digital Signature Schemes”. The main mathematical foundations of these algorithms are investigated, in particular, lattice cryptography, code-based schemes, multivariate transformations, elliptic curve isogenies and MPC-in-the-Head methods. Their performance, security and efficiency in the context of post-quantum threats are assessed. A detailed analysis of the length of public keys, signatures and the speed of key generation, signing and verification operations is carried out. The main advantages and disadvantages of each approach are identified, promising directions for the development of post-quantum digital signatures and their possible practical application are identified. The research is relevant in connection with the need to transition to new cryptographic standards that will guarantee data security in the future. The results allow to assess the strengths and weaknesses of the considered algorithms, as well as to identify promising directions for the further researches of post-quantum cryptography.

Downloads

Download data is not yet available.

References

Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process (2024). NIST Internal Report NIST IR 8528 https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8528.pdf

National Institute of Standards and Technology (2022) Call for Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process. https://csrc.nist.gov/csrc/media/Projects/ pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf

National Institute of Standards and Technology (2025) Post-Quantum Cryptography: Additional Digital Signature Schemes Round 2 Additional Signatures. https://csrc.nist.gov/projects/pqc-dig-sig/round-2- additional-signatures

Information Technologies. Cryptographic Information Protection (2023) Electronic Signature Algorithm on Algebraic Lattices with Deviations: DSTU 9212:2023. Kyiv: Derzhspozhyvstandart of Ukraine [in Ukrainian]

CROSS – Codes and Restricted Objects Signature Scheme (2025) Submission to the NIST Post-Quantum Cryptography Standardization Process. https://www.cross-crypto.com/CROSS_ Specification_v2.0.pdf

Baldi M. and others (2025) LESS. Linear Equivalence Signature Scheme. https://www.less-project.com/ LESS-2025-02-07.pdf

Marius A. and others (2025) SQIsign. Algorithm specifications and supporting documentation. Version 2.0. URL:. https://sqisign.org/spec/sqisign-20250205.pdf

Joppe W. Bos and others (2025) HAWK. Version 1.1. URL: https://hawk-sign.info/hawk-spec.pdf

Agj G. and others (2025) Mirath Signature Scheme Algorithm Specifications and Supporting Documentation. URL: https://pqc-mirath.org/assets/downloads/mirath_v2.0.pdf.

Feneuil Th. Rivain M (2023) MQOM: MQ on my Mind Algorithm. Specifications and Supporting Documentation (Version 1.0). URL: https://mqom.org/docs/mqom-v1.0.pdf

Aaraj Na. and others (2025) PERK. Version 2.0. URL: https://pqc-perk.org/assets/downloads/perk- v2.0.pdf

Aragon N. and others. RYDE Signature Scheme. Algorithm Specifications and Supporting Documentation. Version 2.0. URL: https://pqc-ryde.org/assets/downloads/ryde_specification_v2.0.pdf

Melchor C. A. and others (2023) The Syndrome Decoding in the Head (SD-in-the-Head) Signature Scheme. Algorithm Specifications and Supporting Documentation – Version 1.1. URL: https://sdith.org/ docs/sdith-v1.1.pdf

Beullens W. and others (2023) MAYO. Algorithm Specifications. URL: https://pqmayo.org/assets/specs/ mayo.pdf.

Hiroki Furue and others (2025) QR-UOV. Algorithm Specifications. Nippon telegraph and telephone corporation. URL: https://info.isl.ntt.co.jp/crypt/qruov/files/qruov_Spec-v2.0.pdf

SNOVA (2023) Proposal for NIST PQC: Digital Signature Schemes project. Version 1.0. URL: https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/round-1/spec-files/SNOVA-spec-web

Beullens W. and others (2023) UOV: Unbalanced Oil and Vinegar. Algorithm Specifications and Supporting Documentation. Version 1.0. URL: https://drive.google.com/file/d/1NdMHuCyyFG6xgQG rpssM99kyiNwA9JG-/view

Baum C. and others (2025) FAEST v2: Algorithm Specifications. Version 2.0. URL: https://faest.info/ faest-spec-v2.0.pdf.

Published
2025-07-15
Cited
How to Cite
Gorbenko, I., Ostrianska, Y., & Ponomar, V. (2025). EVALUATION AND COMPARISON OF CRYPTOGRAPHIC DIGITAL SIGNATURE TRANSFORMATIONS OF THE ADDITIONAL NIST COMPETITION «DIGITAL SIGNATURE SCHEMES». Computer Science and Cybersecurity, (1), 6-16. https://doi.org/10.26565/2519-2310-2025-1-01
Section
Статті