Foundation · v0.2.0 · Decision aid

Decision Trees.

Visual navigation for the question every inventory row eventually asks — which PQC standard applies here?

One concrete decision tree, kept deliberately small. It walks from the cryptographic operation a system performs to the right NIST standard — ML-KEM (FIPS 203), ML-DSA (FIPS 204), or SLH-DSA (FIPS 205). The same logic is in the briefings as prose; this page renders it as a tree so a network admin running through forty inventory rows can answer in seconds rather than re-reading a paragraph.

SeriesQuantum · Foundation
DocumentDecision aid
Version0.2.0 · 2026
LicenseCC BY 4.0
01 / HOW TO READ

Two questions. One answer.

Each branch lands on a finalized NIST standard.

Start at the top with the question "What is the cryptographic operation?" If the system establishes a shared secret over a network — a TLS handshake, an IPsec key exchange, an SSH session — follow the left branch to ML-KEM (FIPS 203). If the system produces a signature — a TLS certificate, a JWT, a code-signing artifact, a firmware update — follow the right branch to a second question that distinguishes general-purpose signatures (ML-DSA) from conservative long-lived signing (SLH-DSA).

The right answer for most inventory rows is one of three. Mixed systems — a TLS endpoint also uses certificate signatures, an identity provider does both key exchange and JWT signing — get two or three rows in the inventory, one per cryptographic role, not one combined row.

02 / THE TREE

Which PQC standard applies?

FIPS 203 · 204 · 205.
DIAGRAM 01 Which PQC standard applies? Tree · v0.2.0
Which PQC standard applies — branching decision tree A two-level branching decision tree that asks first what cryptographic operation a system performs. If the answer is key establishment, it routes to ML-KEM (FIPS 203, key encapsulation for TLS, VPN, SSH session setup). If the answer is digital signature, a second question asks whether the use is general-purpose or long-lived and conservative. General-purpose signatures route to ML-DSA (FIPS 204, used for TLS certificates, JWTs, document signing). Long-lived and conservative signatures route to SLH-DSA (FIPS 205, used for root certificate authorities, firmware, code signing, long-lived trust anchors). What is the cryptographic operation? Long-lived or conservative role for the signature? FIPS 203 ML-KEM Key encapsulation FIPS 204 ML-DSA General-purpose signature FIPS 205 SLH-DSA Hash-based · conservative Key establishment Digital signature No — general-purpose Yes — long-lived / root CA / firmware
Q1 · What is the cryptographic operation?
├── Key establishment→ ML-KEM (FIPS 203) · key encapsulation for TLS / VPN / SSH
│
└── Digital signature
    │
    └── Q2 · Long-lived or conservative role for the signature?
        ├── No — general-purpose (TLS cert, JWT, document)→ ML-DSA (FIPS 204) · general signature
        │
        └── Yes — root CA / firmware / code-signing / long-lived
            → SLH-DSA (FIPS 205) · hash-based, conservative

Outcomes — at a glance

IfThenStandardWhy
Key establishment ML-KEM FIPS 203 Replaces RSA and ECDH in session-setup handshakes. CNSA 2.0 mandates ML-KEM-1024 for National Security Systems.
General-purpose signature ML-DSA FIPS 204 Replaces RSA and ECDSA in TLS certificates, JWTs, and document-signing pipelines. Lattice-based; same family as ML-KEM.
Long-lived or conservative signature SLH-DSA FIPS 205 Stateless hash-based. Diversity option against the lattice assumption. Preferred for root CAs, firmware, code-signing, and any signing event whose verification surface lives for decades.
03 / EDGE CASES

Mixed systems and gray areas.

When the tree lands you on more than one row.

A single product often performs multiple cryptographic roles. A TLS terminator does both key establishment (ECDH-class) and signature verification (against the server certificate). An identity provider may issue JWTs (signature) and accept federated logins (signature verification). When that happens, the rule is: one inventory row per cryptographic role, not one combined row. Run the tree for each role independently.

How to handle the common collisions

  • TLS endpoint with certificate signing. Two rows — one for the key exchange (ML-KEM via FIPS 203), one for the certificate signature (ML-DSA via FIPS 204).
  • Code-signing CA chain. Two rows — one for the issuance signature (ML-DSA or SLH-DSA depending on lifetime), one for the verification path (matching).
  • Hardware security module storing keys. Inventory the cryptographic operations the HSM performs, not the HSM itself. An HSM that signs releases is one row; an HSM that wraps key-establishment material is another.
  • Symmetric primitives (AES, hashes). Out of scope for this tree. Symmetric ciphers are not directly broken by quantum computers — the migration is a key-size uplift, not an algorithm change. See the glossary entry on AES and the Grover's algorithm entry.

When SLH-DSA is the right call

  • Root CA signing keys. Multi-decade lifetime; cascade risk if compromised; algorithm-diversity hedge against future lattice cryptanalysis is worth the size cost.
  • Firmware update signing. Device fleets with 7–10+ year field life; verification path lives on devices that can't be easily updated.
  • Code-signing for archival or long-lived binaries. Signed software whose verification surface extends past the CNSA 2.0 inflection (2027–2031).
  • Anywhere algorithm diversity is an explicit policy requirement. SLH-DSA's security depends only on the hash function, which is a fundamentally different assumption from the lattice problems underlying ML-DSA.
Cross-references

For the standards detail — parameter sets, key/signature sizes, CNSA 2.0 mandates — see Standards & Timelines. For the architectural depth on hybrid construction and downgrade-attack discipline, see the Security Architects briefing. For the operational checklist before any deployment, see the Inventory Worksheet. For the structured exposure-class analysis, see the Active Research note.

Quantum · Decision Trees v0.2.0 © 2026 Deretti Cyber Labs · CC BY 4.0 1 of 1 · more planned