Quantum Exposure Snapshot Cryptographic exposure assessment · Prospective visibility
Forensic inventory of your organisation's cryptographic surface and prospective visibility of the impact that the most recent quantum computing resource estimates (Google Quantum AI, Caltech/Oratomic) and the migration deadlines set by NIST would have on your assets.
Not a security audit. Not a penetration test. Not a certification. A technical snapshot that documents what is currently exposed, how it benchmarks against the most recent academic resource estimates, and which concrete steps would be reasonable to plan before the NIST 2030 / 2035 deadlines.
What it is
A scoped technical assessment of your current cryptographic exposure against the most recent academic projections on cryptographically relevant quantum computing (CRQC).
The product delivers a forensic inventory across three dimensions (blockchain, TLS/PKI, operational inventory), an exposure map specific to your organisation, and a prioritised migration roadmap based on official NIST timelines and on the trajectories published by the leading quantum research groups.
It is intended for organisations that need to document their posture against regulatory deadlines in a sober, verifiable way, without resorting to alarmist language or to products that promise protection that does not yet exist.
What it evaluates
Three weighted dimensions. Aggregate scoring is adjusted to your organisation's profile (pure custodian vs operating exchange vs fund vs law firm).
Blockchain Exposure
Inventory of wallets under the organisation's control and classification of their exposure surface to a future CRQC: P2PK Bitcoin, address reuse, BLS validator keys, multisig keys, on-chain governance keys. Mapping of which public keys are already exposed on-chain.
TLS / PKI
Assessment of TLS certificates for public and private endpoints: current signature algorithm (RSA-2048 / ECDSA / etc.), length, renewal date, presence or absence of hybrid PQC, alignment with the NIST 2035 deadline and with the roadmap stated by Cloudflare.
Inventory and rotation
Operational cryptographic inventory: document signing, encrypted backups, long-life archives, key rotation policy, documented PQC posture. Identification of "harvest now, decrypt later" surfaces.
What it is not
To align expectations from the start, four explicit boundaries of the product.
Methodology and sources
Exposure projections are based exclusively on verifiable academic literature and on published regulatory deadlines. The references are as follows.
arXiv:2603.28846 (April 2026).
Resource estimates to break ECDLP-256 (the curve used by Bitcoin, Ethereum, TRON):
fewer than 1,200 logical qubits, fewer than 500,000 physical qubits with surface
code, runtime in minutes for a fast-clock CRQC. Approximately 20× reduction over
prior estimates.
arXiv:2603.28627 (April 2026).
Shor's algorithm with approximately 10,000 physical qubits in a neutral-atom architecture
with qLDPC (not surface code). Trajectory conditional on engineering challenges that
remain unresolved at the date of this document.
FIPS 203 /
204 /
205
(August 2024). Definitive post-quantum standards: ML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA (SPHINCS+).
NIST IR 8547. Official 2035 deprecation deadline
for vulnerable classical algorithms in federal systems. High-risk systems are expected
to migrate earlier.
No operational CRQC exists today. The projections are conditional on engineering challenges that remain unresolved. The detailed methodology is documented specifically for each engagement, under mutual confidentiality.
Who it is for
The product is sized for organisations with substantial cryptographic exposure and documentation obligations toward internal or external stakeholders.
Deliverable
The product is delivered as a closed package with predefined scope. Any extension is a separate engagement.
Structured report
Scoring broken down by the three dimensions, organisation-specific exposure map, technical observations.
Prioritised migration plan
Quick wins (1-3 months), mid phases (3-12 months) and long-range planning up to NIST 2035.
Technical session with your team
Walk-through of the report, Q&A and discussion of implementation priorities.
7-14 business days
From admission and engagement signature. Specific timing confirmed once scope is agreed.
Regulatory disclaimer
Request the snapshot
The product is allocated by controlled B2B inquiry. No public pricing during pilot. After the initial form, you will receive a scope and fee proposal within 24-72 business hours.