Algorithm-Specific Threat Models

Detailed threat analysis for each of the 48 cryptographic algorithms in the MetaMUI Crypto Primitives suite.

Categories

Post-Quantum Algorithms

19 post-quantum algorithms including NIST standardized, KPQC, and stateful signatures.

Classical Algorithms

29 classical algorithms covering all cryptographic primitives.

Risk Assessment Overview

Category Algorithm Count Quantum Risk Classical Risk Implementation Risk
Post-Quantum 19 Very Low Very Low Medium
Classical Symmetric 8 Low* Very Low Low
Classical Hash 11 Low* Very Low Low
Classical Asymmetric 4 High** Very Low Medium
Key Derivation 4 Low* Very Low Low
MAC/Authentication 4 Low* Very Low Low

*Grover’s algorithm provides quadratic speedup
**Vulnerable to Shor’s algorithm - migration required

Selection Criteria

When choosing algorithms, consider:

  1. Security Requirements
    • Data sensitivity and classification
    • Protection lifetime requirements
    • Regulatory compliance needs
  2. Threat Environment
    • Quantum threat timeline
    • Adversary capabilities
    • Attack surface
  3. Performance Constraints
    • Computational resources
    • Network bandwidth
    • Latency requirements
  4. Implementation Maturity
    • Algorithm standardization status
    • Library availability
    • Deployment experience

Quick Navigation

By Security Level

By Use Case


Back to Threat Models