Algorithm-Specific Threat Models
Detailed threat analysis for each of the 69 cryptographic algorithms (33 classical + 36 post-quantum) in the MetaMUI Crypto Primitives suite.
Categories
Post-Quantum Algorithms
36 post-quantum algorithms including NIST standardized, KPQC, and stateful signatures.
- NIST Standardized: ML-KEM (3), ML-DSA (3), SLH-DSA (6), Falcon (2)
- Korean PQC: SMAUG-T, HAETAE, AIMer, NTRU+
- Stateful Signatures: XMSS, LMS
- Code-Based: Classic McEliece (5), HQC (3), FrodoKEM (3)
- Lattice-Based: NTRU Prime (5)
Classical Algorithms
33 classical algorithms covering all cryptographic primitives.
- Hash Functions: SHA family, Blake family, Keccak, SHAKE
- Symmetric Encryption: AES, ChaCha20, ARIA, Camellia, Ascon, Deoxys-II
- Message Authentication: HMAC, Poly1305, CMAC
- Key Derivation: HKDF, PBKDF2, Argon2id, Blake3-KDF
- Digital Signatures: Ed25519, Sr25519
- Key Exchange: X25519
- Random Generation: HMAC-DRBG
- Utilities: BIP39, FlatHash, SipHash
Risk Assessment Overview
| Category | Algorithm Count | Quantum Risk | Classical Risk | Implementation Risk |
|---|---|---|---|---|
| Post-Quantum | 19 | Very Low | Very Low | Medium |
| Classical Symmetric | 8 | Low* | Very Low | Low |
| Classical Hash | 11 | Low* | Very Low | Low |
| Classical Asymmetric | 4 | High** | Very Low | Medium |
| Key Derivation | 4 | Low* | Very Low | Low |
| MAC/Authentication | 4 | Low* | Very Low | Low |
*Grover’s algorithm provides quadratic speedup
**Vulnerable to Shor’s algorithm - migration required
Selection Criteria
When choosing algorithms, consider:
- Security Requirements
- Data sensitivity and classification
- Protection lifetime requirements
- Regulatory compliance needs
- Threat Environment
- Quantum threat timeline
- Adversary capabilities
- Attack surface
- Performance Constraints
- Computational resources
- Network bandwidth
- Latency requirements
- Implementation Maturity
- Algorithm standardization status
- Library availability
- Deployment experience