In his presentation, Martin Schmatz raised important concerns about Dilithium's (ML-DSA) k-values and the rejection sampling retry mechanism. This is a critical consideration for stress testing post-quantum signature algorithms.
Unlike classical algorithms (RSA, ECDSA) where signing time is deterministic, Dilithium uses rejection sampling that may require multiple internal retries. This creates timing variance that could impact systems under high load, particularly for latency-sensitive applications.
We've implemented dedicated testing for this: See the Post-Quantum Cryptography page for detailed ML-DSA rejection sampling analysis, including:
The benchmark runs for 90 seconds to collect ~108,000 samples for statistically robust P99.99 measurements.
What This Chart Shows: This benchmark measures AES-256-GCM encryption throughput across different block sizes (16 bytes to 8KB) to reveal how cryptographic operations scale with data size.
Key Insights:
Real-World Impact: Applications encrypting small messages (e.g., individual database fields, IoT sensor data) will see much lower throughput than bulk encryption (file encryption, large API payloads).