A software developer toolkit for implementing quantum-resistant solutions based on post-quantum algorithms Implementation of leading post-quantum cryptographic algorithms. These algorithms are secure against attacks using both classical and quantum computers. The algorithms are provided as a library and integrated into OpenSSL, enabling their use across a wide range of applications. The library is compatible with all major processor architectures.
SLH-DSA (FIPS 205) is a cryptographic scheme based on the cryptographic security of a hash function. The scheme includes algorithms for generating and verifying a digital signature.
The algorithm supports multiple parameter sets, which have a significant impact on performance and signature size.
Task;Parameter set optimized for performance;Parameter set optimized for data size
A Russian digital signature scheme developed by QApp, based on the SLH-DSA (FIPS 205) meta-scheme and the Streebog hash function (GOST R 34.11-2012). The cryptographic scheme includes algorithms for digital signature generation and verification.
The scheme supports multiple parameter sets, allowing trade-offs between performance and signature size.
The security proof is derived from the security proof of SLH-DSA (FIPS 205).
The Hypericum digital signature scheme is in the process of standardization under Technical Committee 26 of Rosstandart.
1. Expert assessment by the mathematical and cryptographic community
While the ultimate limits of quantum computing capabilities remain an open research question, the mathematical foundations underlying the post-quantum algorithms implemented in the PQLR library are among the most extensively studied.
2. Complementarity of algorithms from a mathematical approaches
The cryptographic algorithms implemented in the library are selected to rely on different classes of hard mathematical problems considered resistant to quantum analysis. These include:
The Shortest Vector Problem (SVP) in lattices
The Random Linear Code Decoding problem
A searching for the second-preimage resistance, collision resistance, and preimage resistance of cryptographic hash functions
Solving a systems of nonlinear over a finite field
Employing a set of cryptographic algorithms based on fundamentally different mathematical problem classes provides an additional layer of security for information systems if one of the algorithms is compromised.