Algorithm-Specific Threat Models
Detailed threat analysis for each of the 48 cryptographic algorithms in the MetaMUI Crypto Primitives suite.
Categories
Post-Quantum Algorithms
19 post-quantum algorithms including NIST standardized, KPQC, and stateful signatures.
- NIST Standardized: ML-KEM, ML-DSA, SLH-DSA variants
- NIST Round 4: Falcon-512, Falcon-1024
- Korean PQC: SMAUG-T, Haetae, AIMer, NTRU+
- Stateful Signatures: XMSS, LMS
- Code-Based: Classic McEliece, HQC-128, FrodoKEM
Classical Algorithms
29 classical algorithms covering all cryptographic primitives.
- Hash Functions: SHA family, Blake family, Keccak, SHAKE
- Symmetric Encryption: AES, ChaCha20, ARIA, Camellia, Ascon, Deoxys-II
- Message Authentication: HMAC, Poly1305, CMAC
- Key Derivation: HKDF, PBKDF2, Argon2id, Blake3-KDF
- Digital Signatures: Ed25519, Sr25519
- Key Exchange: X25519
- Random Generation: HMAC-DRBG
- Utilities: BIP39, FlatHash, SipHash
Risk Assessment Overview
| Category | Algorithm Count | Quantum Risk | Classical Risk | Implementation Risk |
|---|---|---|---|---|
| Post-Quantum | 19 | Very Low | Very Low | Medium |
| Classical Symmetric | 8 | Low* | Very Low | Low |
| Classical Hash | 11 | Low* | Very Low | Low |
| Classical Asymmetric | 4 | High** | Very Low | Medium |
| Key Derivation | 4 | Low* | Very Low | Low |
| MAC/Authentication | 4 | Low* | Very Low | Low |
*Grover’s algorithm provides quadratic speedup
**Vulnerable to Shor’s algorithm - migration required
Selection Criteria
When choosing algorithms, consider:
- Security Requirements
- Data sensitivity and classification
- Protection lifetime requirements
- Regulatory compliance needs
- Threat Environment
- Quantum threat timeline
- Adversary capabilities
- Attack surface
- Performance Constraints
- Computational resources
- Network bandwidth
- Latency requirements
- Implementation Maturity
- Algorithm standardization status
- Library availability
- Deployment experience