Skip to content

feat: Document post-quantum threat models across cryptographic primitives #76

@Meyanis95

Description

@Meyanis95

Background

As quantum computing advances, many cryptographic primitives currently used in privacy-preserving protocols face potential vulnerabilities. We need to incrementally document post-quantum (PQ) threats across the iptf-map knowledge base to help institutions understand the long-term security implications of their technology choices.

Objective

Perform a systematic pass through iptf-map content to add PQ threat documentation where relevant. The goal is not to catalog PQ-resistant alternatives, but to clearly surface the quantum-computing threat model for existing cryptographic approaches.

Scope

In Scope

  • Document PQ vulnerabilities for cryptographic primitives used in patterns
  • Flag "harvest now, decrypt later" (HNDL) risks for encryption schemes
  • Note where proof systems have soundness breaks under quantum adversaries
  • Specify security bit requirements in PQ context (e.g., "needs 256-bit security against quantum adversaries")

Out of Scope

  • Comprehensive PQ-resistant architecture design
  • Detailed migration strategies to PQ cryptography
  • Implementation of PQ alternatives

Acceptance Criteria

  • Audit all cryptographic primitives mentioned in patterns
  • Add PQ threat notes to relevant pattern sections (typically in "Guarantees" or "Trade-offs")
  • Use consistent terminology (e.g., "quantum adversary", "HNDL attack")
  • Update affected patterns' lastmod dates
  • Document changes in CHANGELOG.md

References

Metadata

Metadata

Assignees

No one assigned

    Labels

    documentationImprovements or additions to documentationenhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions