AI & Machine Learning PQC AI model protection, true data provenance, scale encryption, and securing agentic workflows.
15 questions
PQC Fundamentals Quantum threats, HNDL attacks, and the basics of post-quantum cryptography.
20 questions
Algorithm Families Lattice-based, code-based, and hash-based PQC algorithms — names, properties, and trade-offs.
30 questions
NIST Standards FIPS standards, security levels, and the NIST PQC standardization process.
24 questions
Migration Planning Migration frameworks, crypto agility, CBOM, and hybrid deployment strategies.
20 questions
Compliance & Regulations CNSA 2.0, ANSSI, eIDAS 2.0, and global PQC compliance deadlines.
30 questions
Protocol Integration PQC in TLS, IPsec, CMS/S/MIME, OpenPGP, 5G, and SSH protocols.
28 questions
Industry Threats Sector-specific quantum risks across finance, healthcare, telecom, and more.
20 questions
Crypto Operations KEMs vs signatures, key sizes, encapsulation, performance, and practical trade-offs.
20 questions
Digital Assets Blockchain cryptography, elliptic curves, HD wallets, and post-quantum threats to digital assets.
20 questions
TLS Basics TLS 1.3 handshake, cipher suites, key exchange, certificates, and PQC integration.
20 questions
PKI Infrastructure X.509 certificates, certificate authorities, digital signatures, and PQC migration for PKI.
20 questions
Digital Identity eIDAS 2.0, EUDI Wallets, credential formats, trust frameworks, and post-quantum readiness for digital identity.
20 questions
5G Security SUCI subscriber privacy, 5G-AKA authentication, MILENAGE, SIM provisioning, and post-quantum upgrades for 5G networks.
20 questions
Quantum Threats Shor's and Grover's algorithms, CRQC timelines, HNDL attack mechanics, and security level degradation.
14 questions
Hybrid Cryptography Hybrid KEMs, composite signatures, X25519MLKEM768, dual-OID certificates, and transition standards.
20 questions
Crypto Agility Abstraction layers, CBOM scanning, provider model, CycloneDX, and the 7-phase migration framework.
10 questions
VPN/IPsec & SSH IKEv2 with ML-KEM, SSH hybrid key exchange, WireGuard Rosenpass, and protocol size comparisons.
10 questions
Stateful Signatures LMS/HSS, XMSS/XMSS^MT, Merkle tree signatures, one-time signature state, and NIST SP 800-208.
16 questions
Email & Document Signing S/MIME, CMS SignedData/EnvelopedData, RFC 9629 KEMRecipientInfo, and PQC migration for email.
10 questions
KMS & PQC Key Management Key lifecycle (NIST SP 800-57), envelope encryption with ML-KEM, hybrid key wrapping, multi-provider rotation planning.
15 questions
HSM & PQC Operations PKCS#11 v3.2, HSM vendor comparison, firmware migration, and FIPS 140-3 validation.
15 questions
Entropy & Randomness SP 800-90 A/B/C, DRBGs, entropy sources, TRNG vs QRNG, and min-entropy estimation.
15 questions
Merkle Tree Certificates MTC batch signing, inclusion proofs, MTCA architecture, domain-separated hashing, and IETF PLANTS WG standardization.
20 questions
Quantum Key Distribution BB84 protocol, QBER eavesdropper detection, sifted keys, privacy amplification, satellite QKD, and QKD + PQC hybrid integration.
20 questions
Code Signing & Supply Chain Code signing certificate chains, ML-DSA package signing, Sigstore keyless signing, and supply chain integrity.
10 questions
API Security & JWT JWT/JWS/JWE with PQC algorithms, JOSE header changes, ML-DSA token signing, ML-KEM key agreement, and OAuth 2.0 migration.
10 questions
IoT & OT Security PQC for constrained devices, RFC 7228 device classes, firmware signing, DTLS 1.3, certificate chain bloat, and SCADA migration.
10 questions
PQC Risk Management Risk quantification, CRQC timeline planning, risk registers, and quantum threat-based risk assessment.
10 questions
PQC Business Case ROI modeling, breach cost analysis, budget frameworks, and executive communication for PQC investment.
10 questions
PQC Governance & Policy RACI matrices, PQC policies, governance models, board reporting, and organizational accountability.
10 questions
Compliance Strategy Multi-jurisdiction mapping, audit readiness, regulatory horizon scanning, and compliance planning.
10 questions
Migration Program Roadmap construction, phase-gating, resource planning, stakeholder communications, and KPI tracking.
10 questions
Vendor & Supply Chain Vendor PQC scorecards, contract requirements, SBOM/CBOM evaluation, and third-party risk assessment.
10 questions
Data & Asset Sensitivity Classifying data assets, mapping compliance obligations, NIST RMF/ISO 27005/FAIR methodologies, and PQC migration priority.
10 questions
Standards, Certification & Compliance Bodies NIST, ISO/IEC, ETSI, IETF, CMVP, ENISA, ANSSI, BSI — who creates standards, who certifies, and who mandates.
15 questions
Web Gateway PQC PQC deployment at web gateways, CDNs, load balancers, and WAFs: TLS termination, certificate lifecycle, and vendor migration.
15 questions
Energy & Utilities PQC NERC CIP compliance, IEC 61850/62351 substation security, DNP3/DLMS/COSEM protocol hardening, smart meter key management, and safety risk scoring.
15 questions
EMV & Payment PQC EMV chip card authentication, payment network PQC migration, tokenization, POS terminal crypto, and PCI DSS compliance.
15 questions
Healthcare PQC HIPAA/HITECH compliance, HL7 FHIR security, medical device cryptography, and healthcare data protection.
15 questions
Aerospace PQC Avionics protocol constraints, satellite link budgets, DO-178C certification, export controls, and multi-decade fleet crypto interoperability.
15 questions
Automotive PQC Vehicle E/E architecture, sensor data integrity, ISO 26262 safety-crypto, automotive HSM lifecycle, digital car keys, OTA orchestration, and V2X PKI migration.
15 questions
Cryptographic APIs & Languages JCA/JCE, OpenSSL EVP, PKCS#11, Windows CNG, Bouncy Castle, and Rust/Go/Python/Java crypto ecosystems with PQC library selection, provider patterns, and migration guidance.
15 questions
Confidential Computing & TEEs TEE architectures (SGX, TDX, CCA, SEV-SNP, Nitro), remote attestation, memory encryption, TEE-HSM integration, and quantum threat analysis for confidential computing.
15 questions
Platform Engineering & PQC CI/CD pipeline crypto inventory, container signing migration, IaC quantum-vulnerable defaults, policy enforcement, posture monitoring, and platform migration runway.
15 questions
Secrets Management & PQC Migrate secrets managers (Vault, AWS Secrets Manager, Azure Key Vault) to quantum-safe encryption, automated rotation, and PQC key wrapping.
15 questions
Network Security & PQC NGFWs, IDS/IPS, TLS inspection, and zero trust network architecture migration to post-quantum cryptography.
15 questions
Database Encryption & PQC TDE, column-level encryption, queryable encryption, and BYOK/HYOK migration for databases with external PQC KMS.
15 questions
Identity & Access Management with PQC JWT/SAML/OIDC token signing with ML-DSA, Active Directory quantum risks, and PQC zero trust identity architecture.
15 questions
Secure Boot & Firmware PQC Migrate UEFI Secure Boot, firmware signing, and TPM attestation to post-quantum cryptography with ML-DSA-65.
15 questions
OS & Platform Crypto PQC System-wide TLS policies, SSH host key migration, package signing, and FIPS mode compatibility for OS-level PQC.
15 questions
Executive Quantum Impact Fiduciary risk, regulatory deadlines, board-level PQC action planning, and quantum exposure self-assessment.
10 questions
Developer Quantum Impact Library transitions, key/signature size impacts, TLS/JWT migration, and developer PQC readiness.
10 questions
Architect Quantum Impact PKI hierarchy migration, hybrid certificate design, HSM root of trust, and crypto-agile architecture.
10 questions
Ops Quantum Impact Certificate operations, VPN/SSH fleet migration, monitoring recalibration, and deployment pipeline PQC.
10 questions
Researcher Quantum Impact Research data HNDL exposure, institutional infrastructure, PQC algorithm research opportunities.
10 questions
PQC Testing & Validation Passive discovery, active scanning, performance benchmarking, interoperability testing, TVLA, and test strategy design.
15 questions