Toggle Menu
QTA
Threat Modeling
Toggle user menu
Quantum Threat Modeling
Simulate potential quantum attack vectors and evaluate mitigation strategies.
System Architecture
A standard web application with a frontend, backend API, and a PostgreSQL database. User authentication is handled via JWTs signed with RSA-2048. All external traffic is over TLS 1.2.
Vulnerable Algorithms (comma-separated)
RSA-2048, ECDH, SHA-256
Desired Mitigations (comma-separated)
CRYSTALS-Kyber, CRYSTALS-Dilithium
Run Simulation