Cryptographic Threat Models

Comprehensive threat analysis for all 49 algorithms in the MetaMUI Crypto Primitives suite.

Overview

This section provides detailed threat models for every cryptographic algorithm implemented in MetaMUI, covering quantum threats, classical attacks, implementation vulnerabilities, and protocol-level risks.

General Threat Models

Foundational Threat Analysis

Algorithm-Specific Threat Models

Post-Quantum Algorithms (19 algorithms)

NIST Standardized (FIPS 203/204/205)

NIST Round 4 Additional

Korean Post-Quantum (KPQC)

Stateful Hash-Based Signatures

Code-Based & Additional KEMs

Classical Algorithms (30 algorithms)

Hash Functions (11 algorithms)

Symmetric Encryption (8 algorithms)

Message Authentication (4 algorithms)

Key Derivation (4 algorithms)

Digital Signatures & Key Exchange (5 algorithms)

Random Generation & Utility (2 algorithms)

Threat Categories

Detailed analysis of specific attack vectors:

Attack Vector Analysis

Risk Assessment Matrix

Overall Algorithm Risk Levels

Algorithm Category Quantum Risk Classical Risk Implementation Risk Overall Risk
NIST PQC (ML-KEM/DSA/SLH-DSA) Very Low Very Low Medium Low
Falcon Signatures Very Low Very Low High Medium
KPQC Algorithms Very Low Low Medium Low-Medium
Stateful Signatures Very Low Very Low High* Medium
Classical Symmetric N/A** Very Low Low Low
Classical Hash Low*** Very Low Low Very Low
Classical Signatures High** Very Low Medium High*****

State management critical
Grover’s algorithm requires 2x key size
***Grover’s provides quadratic speedup
**
Vulnerable to Shor’s algorithm
**
**Requires migration to PQC

Compliance & Standards

Regulatory Requirements

Industry Standards

Quick Reference

By Security Level

By Deployment Priority

  1. Immediate: Long-term data encryption (use PQC now)
  2. High: Digital signatures for long-lived certificates
  3. Medium: TLS/HTTPS connections
  4. Low: Short-lived session keys

Threat Intelligence Updates

Last Updated: 2025-10-14

Recent Developments


Note: Threat models are reviewed quarterly and updated based on emerging threats and cryptanalytic advances.