Algorithm Selector

This guide helps you choose the right post-quantum algorithm for your use case. Recommendations are based on security requirements, performance characteristics, compliance needs, and deployment constraints.

Key Encapsulation (KEM)

Use Case Recommended Alternative Standard Security Level
General key exchange ML-KEM-768 ML-KEM-1024 NIST FIPS 203 Level 3/5
Korean compliance SMAUG-T3 SMAUG-T5 KPQC Level 3/5
Conservative FrodoKEM-976 Classic-McEliece Level 5
Lightweight/IoT ML-KEM-512 HQC-128 NIST FIPS 203 Level 1

Notes:

Digital Signatures

Use Case Recommended Alternative Standard Signature Size
General signing ML-DSA-65 ML-DSA-87 NIST FIPS 204 3,309 bytes
Compact signatures Falcon-512 Falcon-1024 NIST ~666 bytes
Conservative/stateless SLH-DSA-SHA2-128f SLH-DSA-SHAKE-256f NIST FIPS 205 17,088 bytes
Korean compliance HAETAE-3 HAETAE-5 KPQC varies
Classical (transitional) Ed25519 RSA-2048 RFC 8032 64 bytes

Notes:

Symmetric Cryptography and Hashing

Use Case Recommended Alternative Notes
Authenticated encryption AES-256-GCM ChaCha20-Poly1305 AES-NI hardware or no hardware acceleration
Fast hashing BLAKE3 SHA3-256 BLAKE3 has SIMD acceleration on all platforms
Password hashing Argon2id PBKDF2 Memory-hard; resists GPU/ASIC attacks
Key derivation HKDF-SHA256 BLAKE3-KDF HKDF is the established standard choice
Lightweight AEAD Ascon-128 NIST SP 800-232; designed for constrained devices

Notes:

Selection Criteria

Understanding NIST Security Levels

NIST defines five security levels based on the computational effort required to break the algorithm:

Level Equivalent Strength Meaning
Level 1 AES-128 At least as hard to break as exhaustive key search on AES-128
Level 2 SHA-256 collision At least as hard as finding a SHA-256 collision
Level 3 AES-192 At least as hard as exhaustive key search on AES-192
Level 4 SHA-384 collision At least as hard as finding a SHA-384 collision
Level 5 AES-256 At least as hard as exhaustive key search on AES-256

For most applications, Level 3 provides a strong balance of security and performance. Level 5 is appropriate for high-value, long-lived secrets. Level 1 is suitable for short-lived or low-sensitivity data.

Key Size vs. Performance Tradeoffs

Higher security levels increase key and signature sizes, which affects bandwidth, storage, and computation time. Consider these factors:

Compliance Requirements

Hardware Acceleration

MetaMUI provides SIMD and GPU acceleration for performance-critical algorithms:

Algorithm AVX2 AVX-512 NEON (ARM) Metal (GPU)
Falcon-512/1024 Yes Yes Yes Yes
BLAKE3 Yes Yes Yes
AES-256-GCM AES-NI AES-NI ARM CE
ChaCha20-Poly1305 Yes Yes Yes
ML-KEM Yes Yes
ML-DSA Yes Yes

Falcon and BLAKE3 have the most extensive hardware acceleration, with optimized code paths for all supported SIMD instruction sets plus Apple Metal GPU batch operations for Falcon.