Last revised: March 2026

CRYSTALS-Dilithium (ML-DSA-5) Post-Quantum Cryptography Alignment

FactR Limited (“DataPeak”, “we”, “us”, “our”) aligns its platform architecture and security program with the requirements of the CRYSTALS-Dilithium level-5 (Dilithium5 / ML-DSA-5) post-quantum digital signature scheme, focusing on secure key management, cryptographic integration, and operational controls across the lifecycle of quantum-safe signatures.

This alignment supports high-assurance environments where long-term data integrity, authentication, and resistance to future quantum computing attacks are required.

1. Scope and Post-Quantum Cryptography Alignment

DataPeak implements Dilithium5 as its primary post-quantum digital signature primitive for high-assurance use cases requiring NIST category-5 security.

This implementation applies to DataPeak services requiring:

  • Quantum-safe authentication

  • Code and configuration signing

  • Data integrity protection

  • Long-lived non-repudiation

DataPeak’s cryptographic profile aligns with the NIST-selected post-quantum signature standard based on CRYSTALS-Dilithium, standardized as ML-DSA, targeting the highest available security parameter set (Level 5).

2. Dilithium5 Technical Baseline

DataPeak’s security controls assume the underlying properties of the Dilithium5 parameter set.

Security Level:

NIST PQC Category-5 security providing approximately 256-bit security strength against both classical and quantum adversaries.

Algorithm Class:

Dilithium5 is a lattice-based digital signature scheme based on the module-LWE and module-SIS hardness assumptions.

Mathematical Parameters:

Polynomial ring structure used in the scheme:

Rq = Zq[x] / (xⁿ + 1)
n = 256
q = 8,380,417

Key and Signature Artifacts:

Typical artifact sizes include:

  • Public keys: approximately 2.6 KB

  • Signatures: approximately 4.6 KB

These larger artifact sizes reflect the requirements of post-quantum cryptographic algorithms designed to resist both classical and quantum attacks.

Dilithium is the primary digital signature algorithm selected by NIST for general-purpose post-quantum signatures.

3. DataPeak Alignment Overview

DataPeak maps its technical and operational controls to the key aspects of Dilithium5 deployment, including key lifecycle management, signature operations, performance considerations, and interoperability.

Area Dilithium5 Requirement / Property DataPeak Alignment
Security Level NIST PQC Category-5 (~256-bit security) DataPeak uses Dilithium5 as the default post-quantum cryptography profile for high-risk and long-lived integrity requirements.
Algorithm Type Module-lattice digital signature scheme (CRYSTALS-Dilithium) Cryptographic services integrate Dilithium5 using hardened cryptographic libraries and FIPS-track implementations.
Key & Signature Sizes ≈ 2,592-byte public keys and ≈ 4,595-byte signatures Storage, transport, and protocol fields are designed to support PQC key sizes and signature artifacts with additional capacity for future variants.
Key Metadata Algorithm identifiers and parameter-set identifiers The DataPeak Key Management System (KMS) tags keys with PQC-specific metadata and parameter identifiers to support auditing and policy enforcement.
Implementation Considerations Polynomial arithmetic and NTT operations with side-channel protections Hardware acceleration and constant-time cryptographic libraries are used where available, along with operational monitoring and security hardening.
Standards Interoperability NIST PQC signature standard (ML-DSA) DataPeak tracks NIST PQC FIPS publications and emerging IETF standards to maintain interoperability with Dilithium-based cryptographic systems.

4. Key Management and Operations

DataPeak aligns its key management lifecycle with recommended practices for deploying post-quantum cryptography.

Key Generation:

Dilithium5 key pairs are generated through a centralized Key Management System (KMS) using vetted deterministic randomness sources and approved parameter sets corresponding to NIST Category-5 security.

Key Identification:

Keys are labeled with algorithm identifiers and parameter-set metadata consistent with emerging PQC key-management guidance and Dilithium object identifiers.

Key Serialization and Storage:

Public and private key material is encoded following emerging guidance for CRYSTALS-Dilithium key formats, allowing consistent serialization, compression, and transmission across services.

Access Control:

Private signing keys are stored within hardened key-management components and protected using:

  • Strong identity verification

  • Multi-factor authentication (MFA)

  • Role-based access control (RBAC)

  • Least-privilege access policies

Rotation and Lifecycle Management:

Key lifecycle states include:

  • Creation

  • Activation

  • Rotation

  • Deactivation

  • Archival

Rotation policies account for the long-term integrity guarantees expected from Category-5 security signatures.

5. Signature Use Cases and Integration

DataPeak applies Dilithium5 signatures across several platform integrity and authentication workflows.

Service-to-Service Authentication:

Internal platform services can authenticate requests using Dilithium5-signed tokens or attestations where quantum-safe authentication is required.

Code and Configuration Integrity:

Critical platform artifacts may be signed using Dilithium5 keys, including:

  • Release manifests

  • Configuration bundles

  • Policy objects

This protects platform components from tampering by adversaries capable of exploiting future quantum computing capabilities.

Customer Data Integrity:

High-assurance logs and long-retention records may leverage Dilithium5 signatures to preserve:

  • Tamper-resistant audit trails

  • Long-term non-repudiation

  • Post-quantum data integrity

Hybrid Transition Modes:

DataPeak supports hybrid cryptographic deployment modes where traditional digital signatures operate alongside Dilithium5 during the industry transition toward post-quantum cryptography.

6. Performance, Security, and Interoperability

DataPeak infrastructure is designed to accommodate the computational and bandwidth characteristics of post-quantum digital signatures while maintaining strong operational security.

Performance and Scaling:

Platform services account for the larger key and signature sizes associated with Dilithium5 and optimize operations involving:

  • Polynomial arithmetic

  • Number-Theoretic Transform (NTT) calculations

  • High-volume signature verification

Side-Channel Hardening:

Implementations follow constant-time cryptographic design principles and recommended countermeasures to reduce timing, cache, and micro-architectural side-channel risks.

Standards Alignment:

DataPeak monitors updates to:

  • NIST PQC FIPS publications

  • IETF drafts defining Dilithium key encoding and object identifiers

This ensures long-term interoperability with emerging post-quantum cryptographic standards.

Future-Proofing:

Internal cryptographic abstraction layers allow DataPeak to adopt updated Dilithium parameter sets or future PQC signature algorithms with minimal impact on platform APIs and integrations.

7. Documentation & Contact

Customers may request additional documentation regarding DataPeak’s post-quantum cryptography implementation, including:

  • Dilithium5 key management policies

  • Hardware security module (HSM) integration details

  • Cryptographic migration guidance

  • Security architecture documentation

These materials may be requested through your DataPeak account representative.

You may also view FactR Limited’s Privacy Policy, Terms & Conditions and the NIST SP 800-171 Alignment Statement

Official Standard Reference:

CRYSTALS-Dilithium (ML-DSA) Post-Quantum Digital Signature Standard

https://pq-crystals.org/dilithium/