Workshop Description
Enterprise security teams already use structured threat modelling methodologies. STRIDE and PASTA are the most widely deployed. The challenge is that neither framework was designed to account for the threat of retroactive cryptographic compromise: an adversary who can break RSA and ECDH does not just gain future access but can decrypt all previously captured traffic and data. This changes the threat model fundamentally, and the frameworks need explicit quantum extensions to capture it.
This session provides those extensions. Participants work through each STRIDE category with quantum-specific threat scenarios: Spoofing becomes forged digital signatures via Shor's algorithm; Information Disclosure extends to harvest-now-decrypt-later retroactive decryption; Denial of Service includes certificate revocation cascades following CA key compromise. The PASTA seven-stage process receives quantum inputs at Stage 2 (threat enumeration) and Stage 5 (vulnerability analysis). Cryptanalytic timeline assessment uses the Mosca inequality, expert survey data (Global Risk Institute, government intelligence community assessments), and current quantum hardware progress to assign likelihood ratings. The session concludes with a board communication module: a structured format for translating quantum threat model findings into enterprise risk register entries and a one-page board summary with timeline visualisation and financial exposure estimates.
What participants cover
- STRIDE quantum extensions: mapping each STRIDE category to specific quantum attack scenarios (signature forgery, HNDL decryption, certificate cascade, authentication token compromise)
- PASTA quantum integration: adding quantum threat scenarios at Stage 2 (threat enumeration) and Stage 5 (vulnerability analysis) of the seven-stage process
- Cryptanalytic timeline assessment: current quantum hardware state (superconducting, trapped ion, neutral atom), expert survey data, and the Mosca inequality for risk likelihood rating
- Attack surface analysis: identifying enterprise cryptographic dependencies across TLS, VPN, code signing, PKI, database encryption, and authentication protocols
- Risk register integration: adding quantum cryptographic risk as a quantified line item with impact, likelihood, and mitigation status
- Board communication: one-page summary format with timeline visualisation, financial exposure estimate, and regulatory escalation triggers (NIS2, DORA)