Cryptography
LP-10005
LivingLearning Path - Security & Auditor
System-level threat modeling and security analysis for Lux Network
LP-10005: Learning Path - Security & Auditor
Abstract
"How does this break?"
This path provides system-level threat modeling capabilities.
Motivation
Security auditing requires systematic understanding of attack vectors, vulnerability patterns, and defensive practices. This path trains auditors to protect the ecosystem.
Audience
Security auditors, red teams, cryptographers, protocol researchers.
Prerequisites
Complete LP-0011: Core Protocol Path first.
Outcome
After completing this path, you will understand:
- Cryptographic assumptions and attack surfaces
- Post-quantum security model
- MPC trust boundaries
- ZK verification requirements
- MEV and ordering attacks
Curriculum
Stage 1: Cryptographic Foundations
| Order | LP | Title | Time | Depth |
|---|---|---|---|---|
| 1 | LP-2000 | Crypto Primitives Overview | 30 min | Deep |
| 2 | LP-2100 | Classical Signatures | 25 min | Deep |
| 3 | LP-2200 | Post-Quantum Algorithms | 35 min | Deep |
Stage 2: PQ Security (Q-Chain)
| Order | LP | Title | Time | Depth |
|---|---|---|---|---|
| 4 | LP-0200 | PQC Suite | 30 min | Deep |
| 5 | LP-0316 | ML-DSA | 25 min | Deep |
| 6 | LP-0317 | SLH-DSA | 20 min | Medium |
| 7 | LP-0318 | ML-KEM | 25 min | Deep |
Stage 3: MPC Attack Surfaces (T-Chain)
| Order | LP | Title | Time | Depth |
|---|---|---|---|---|
| 8 | LP-7000 | T-Chain Architecture | 30 min | Deep |
| 9 | LP-0104 | FROST Security Model | 25 min | Deep |
| 10 | LP-0014 | CGGMP21 Analysis | 25 min | Deep |
| 11 | LP-0324 | Ringtail (PQ Threshold) | 25 min | Deep |
Stage 4: ZK Trust Boundaries (Z-Chain)
| Order | LP | Title | Time | Depth |
|---|---|---|---|---|
| 12 | LP-8000 | Z-Chain ZKVM | 30 min | Deep |
| 13 | LP-8100 | Validity Proofs | 25 min | Deep |
| 14 | LP-8200 | Fraud Proofs | 20 min | Medium |
Stage 5: Bridge Security (B-Chain)
| Order | LP | Title | Time | Depth |
|---|---|---|---|---|
| 15 | LP-6000 | B-Chain Architecture | 25 min | Deep |
| 16 | LP-0339 | Emergency Procedures | 20 min | Deep |
| 17 | LP-0019 | Bridge Security Framework | 30 min | Deep |
Stage 6: Trading Security
| Order | LP | Title | Time | Depth |
|---|---|---|---|---|
| 18 | LP-9024 | Audit Requirements | 25 min | Deep |
| 19 | LP-9025 | MEV & Ordering Attacks | 30 min | Deep |
| 20 | LP-9017 | Risk Management | 20 min | Medium |
Total Time
~9 hours for complete coverage.
Threat Model Summary
| Domain | Primary Threats | Key LPs |
|---|---|---|
| Crypto | Quantum attacks, side channels | LP-2xxx, LP-4xxx |
| MPC | Malicious signers, collusion | LP-7xxx |
| ZK | Proof manipulation, soundness | LP-8xxx |
| Bridge | Relay attacks, oracle manipulation | LP-6xxx |
| Trading | MEV, front-running, sandwich | LP-9xxx |
Security Considerations
None — this is a meta/organizational proposal.
Copyright
Copyright and related rights waived via CC0.