Post-Quantum · 7 min read

FALCON vs Dilithium:
Choosing the Right Post-Quantum Signature

A detailed comparison of FALCON and Dilithium signature algorithms to help you choose the best fit for your application.

FIPS 204
Standard
~240µs
Verify
128-bit
PQ Security
3
Algorithms

NIST selected multiple post-quantum signature algorithms to address different use cases. CRYSTALS-Dilithium (ML-DSA) and FALCON are the two primary choices. Understanding their trade-offs helps you select the right algorithm for your application.

Algorithm Overview

Both algorithms are lattice-based but use different mathematical approaches:

Key and Signature Sizes

One of the most significant differences is size:

Size Comparison (Security Level 3)

Dilithium3: Public key 1,952 bytes, Signature 3,293 bytes
FALCON-512: Public key 897 bytes, Signature 666 bytes

FALCON offers significantly smaller signatures—roughly 5x smaller than Dilithium. This makes FALCON attractive for bandwidth-constrained applications like blockchain transactions or IoT devices.

Performance Characteristics

Performance varies by operation:

Dilithium's signing time is predictable, while FALCON's can vary due to its rejection sampling. This matters for real-time applications with strict latency requirements.

Implementation Complexity

Dilithium is significantly easier to implement correctly:

For organizations implementing their own cryptographic code (not recommended but sometimes necessary), Dilithium presents fewer pitfalls.

Side-Channel Resistance

Side-channel attacks extract secrets by analyzing timing, power consumption, or electromagnetic emissions:

Use Case Recommendations

Based on these trade-offs:

Choose Dilithium when:

Choose FALCON when:

What H33 Uses

H33 primarily uses Dilithium3 for our authentication signatures. The reasons:

We may add FALCON support for specific use cases where signature size is critical, such as blockchain attestations.

Future Considerations

Both algorithms are strong choices with different strengths. The cryptographic community continues to analyze both, and neither shows signs of weakness. Your choice should be driven by your application's specific requirements around size, performance, and implementation constraints.

Ready to Go Quantum-Secure?

Start protecting your users with post-quantum authentication today. 1,000 free auths, no credit card required.

Get Free API Key →

Build With Post-Quantum Security

Enterprise-grade FHE, ZKP, and post-quantum cryptography. One API call. Sub-millisecond latency.

Get Free API Key → Read the Docs
Free tier · 10,000 API calls/month · No credit card required
Verify It Yourself