Quantum Threats
Detailed analysis of quantum threats across industries, including criticality, at-risk cryptography, and PQC replacements.
Data Source: quantum_threats_hsm_industries_02212026.csv • Updated: 2/21/2026
Ind.Industry | ID | Description | Crit.Criticality | Crypto | PQC Repl. | Info |
|---|---|---|---|---|---|---|
| Aerospace / Aviation | AERO-001 | Aircraft avionics cryptographic exposure: RTCA DO-326A defines airworthiness security processes for aircraft systems wit... Source: RTCA DO-326A / DO-356A Airworthiness Security | Critical | Avionics PKI ARINC 664 network security flight management system authentication | Crypto-agile avionics design ML-DSA for flight software signing hybrid certificate chains | |
| Aerospace / Aviation | AERO-002 | Satellite communication HNDL vulnerability: Military and commercial satellites have 15-25 year operational lifespans. NS... Source: NSA CNSA 2.0 Cybersecurity Advisory | Critical | Satellite uplink/downlink RSA/ECDSA ground station TLS inter-satellite link encryption | ML-KEM-1024 ML-DSA-87 per CNSA 2.0 AES-256 | |
| Aerospace / Aviation | AERO-003Updated | Air traffic management authentication gap: ICAO Assembly Resolution A41-19 (2022) addresses aviation cybersecurity but A... Source: ICAO Assembly Resolution A41-19 | High | ADS-B (unencrypted) Mode S ATC data links ACARS messaging | Authenticated ADS-B with ML-DSA quantum-safe ATC protocols | |
| Automotive / Connected Vehicles | AUTO-001 | V2X PKI quantum transition: ISO/SAE 21434 (published August 2021) establishes cybersecurity engineering requirements for... Source: ISO/SAE 21434 Road Vehicle Cybersecurity | Critical | ECDSA P-256 V2X certificates IEEE 1609.2 PKI digital key infrastructure | ML-DSA V2X certificates hybrid V2X authentication FN-DSA for constrained ECUs | |
| Automotive / Connected Vehicles | AUTO-002 | OTA firmware update signature forgery: Over-the-Air update mechanisms for modern connected vehicles use RSA/ECDSA code s... Source: SAE J3061 / ISO/SAE 21434 Vehicle Cybersecurity | Critical | RSA/ECDSA code signing secure boot chains ECU firmware verification | ML-DSA firmware signing SLH-DSA for safety-critical ECUs dual-signature verification | |
| Automotive / Connected Vehicles | AUTO-003 | UNECE WP.29 R155/R156 cybersecurity regulation gap: Mandatory for new vehicle type approvals in EU since July 2022 and e... Source: UNECE WP.29 Regulations R155/R156 | High | TLS for telematics RSA/ECDSA for OTA signing connected car cloud API authentication | Hybrid TLS 1.3 with ML-KEM ML-DSA OTA signing crypto-agile telematics | |
| Automotive / Connected Vehicles | AUTO-004 | In-vehicle network security quantum exposure: ISO/SAE 21434 covers the full vehicle cybersecurity lifecycle including CA... Source: ISO/SAE 21434 Road Vehicle Cybersecurity | High | CAN bus authentication secure boot in ECUs in-vehicle Ethernet encryption HSM key storage | Hardware security modules with PQC support crypto-agile ECU design ML-DSA for secure boot | |
| Cloud Computing / Data Centers | CLOUD-003 | Federal cloud PQC compliance requirements: NIST SP 800-210 general access control guidance for cloud systems combined wi... Source: NIST IR 8547 / NIST SP 800-210 | Critical | Federal cloud TLS FedRAMP-authorized encryption cloud HSM FIPS modules | FIPS 203 (ML-KEM) FIPS 204 (ML-DSA) FIPS 205 (SLH-DSA) cloud implementations | |
| Cloud Computing / Data Centers | CLOUD-004 | Cloud HSM and key management PQC gap: NIST SP 800-210 defines access control for cloud systems but cloud-hosted HSMs and... Source: NIST SP 800-210 Cloud Access Control | Critical | Cloud HSM root keys KMS key wrapping tenant isolation keys FIPS 140-3 modules | FIPS 140-3 validated PQC HSM modules bring-your-own-key PQC ML-KEM key wrapping | |
| Cloud Computing / Data Centers | CLOUD-001 | Cloud backup and disaster recovery HNDL risk: Air-gapped backups and long-term archival storage encrypted with RSA/ECDSA... Source: Cloud Security Alliance Quantum-Safe Guidelines | High | Backup encryption key wrapping archival storage TLS disaster recovery replication | PQC-enabled backup encryption ML-KEM key wrapping AES-256 for archival | |
| Cloud Computing / Data Centers | CLOUD-002 | Cloud Security Alliance quantum readiness guidance: CSA published quantum-safe security guidance identifying crypto-agil... Source: Cloud Security Alliance Quantum-Safe Security | High | Cloud KMS key wrapping multi-cloud encryption BYOK/HYOK solutions secrets management | Unified PQC key management ML-KEM cloud HSM integration crypto-agile KMS | |
| Cross-Industry | CROSS-001 | Quantum-safe readiness gap: Organizations score average 25/100 on IBM Quantum-Safe Readiness Index. 70% lack complete cr... Source: IBM Quantum-Safe Readiness Index 2025 | Critical | All asymmetric cryptography PKI infrastructure key management systems | Comprehensive CBOM automated discovery tools ML-KEM/ML-DSA migration | |
| Cross-Industry | CROSS-002Updated | NIST IR 8547 proposed transition timeline: NIST Initial Public Draft (November 2024) establishes proposed timeline to de... Source: NIST IR 8547 Transition to Post-Quantum Cryptography Standards | Critical | RSA-2048/3072/4096 ECDSA P-256/P-384 ECDH EdDSA | ML-KEM-768/1024 (FIPS 203) ML-DSA-44/65/87 (FIPS 204) SLH-DSA (FIPS 205) | |
| Cross-Industry | CROSS-004 | CRQC timeline uncertainty: Global Risk Institute 2024 survey of 32 quantum experts estimates 19-34% probability of a cry... Source: Global Risk Institute Quantum Threat Timeline | Critical | RSA-2048/4096 ECC P-256/384 ECDSA ECDH EdDSA | Immediate hybrid PQC deployment ML-KEM-1024 ML-DSA-87 | |
| Cross-Industry | CROSS-007Updated | EU coordinated PQC transition roadmap: European Commission published coordinated PQC roadmap (June 2025) establishing EU... Source: European Commission Digital Strategy — PQC Roadmap | Critical | All quantum-vulnerable cryptography in EU member state systems and critical infrastructure | ML-KEM ML-DSA SLH-DSA hybrid implementations per EU coordinated timeline | |
| Cross-Industry | CROSS-003 | Vendor dependency crisis: 62% of organizations incorrectly assume vendors will manage quantum-safe transition automatica... Source: IBM Quantum-Safe Readiness Index 2025 | High | Third-party API keys vendor-managed HSMs cloud KMS | Vendor PQC roadmap requirements contractual crypto-agility clauses | |
| Cross-Industry | CROSS-005 | FIPS 206 FN-DSA (Falcon) standardization: NIST submitted draft FIPS 206 for approval August 2025. FN-DSA is the 4th PQC ... Source: NIST FIPS 206 FN-DSA Status | High | RSA/ECDSA certificates requiring compact signatures root CA keys constrained device authentication | FN-DSA (FIPS 206) for compact signatures ML-DSA for general-purpose signing | |
| Cross-Industry | CROSS-006 | HQC selected as 5th PQC algorithm: NIST announced March 11 2025 the selection of HQC (Hamming Quasi-Cyclic) as a backup ... Source: NIST Post-Quantum Cryptography Standardization | High | All systems relying solely on ML-KEM without backup KEM | HQC as backup KEM alongside ML-KEM-768/1024 algorithm diversity strategy | |
| Cross-Industry | CROSS-008 | NIST SP 800-227 KEM recommendations: Published September 2025 as final guidance on key-encapsulation mechanisms. Provide... Source: NIST SP 800-227 Recommendations for KEMs | High | Incorrect or insecure KEM implementations legacy key exchange protocols | FIPS 203 ML-KEM per SP 800-227 guidance proper KEM-TLS integration | |
| Cryptocurrency / Blockchain | CRYPTO-001 | Bitcoin ECDSA transaction hijacking: Approximately $718B in quantum-vulnerable P2PK addresses with exposed public keys (... Source: Federal Reserve HNDL Paper | Critical | secp256k1 ECDSA | P2QRH BIP proposal Lamport signatures hash-based migration | |
| Cryptocurrency / Blockchain | CRYPTO-002 | Ethereum Foundation PQC initiative: Dedicated post-quantum security team established January 2026 with $2M in research p... Source: Ethereum Foundation PQC Program | Critical | secp256k1 ECDSA BLS12-381 keccak256 address derivation | Account Abstraction (EIP-4337) Verkle Trees quantum-resistant signature schemes | |
| Cryptocurrency / Blockchain | CRYPTO-003 | Blockchain HNDL permanence risk: Federal Reserve research confirms distributed ledger networks face permanent data priva... Source: Federal Reserve Board FEDS Paper September 2025 | Critical | RSA-2048 ECDSA ECDH in blockchain protocols BLS signatures | ML-KEM-1024 ML-DSA-87 SLH-DSA validator PQC authentication | |
| Cryptocurrency / Blockchain | CRYPTO-004 | Cryptocurrency custody HSM quantum vulnerability: Institutional custody solutions managing billions in digital assets re... Source: Cryptocurrency Security Standard (CCSS) | Critical | secp256k1 ECDSA custody keys RSA/ECDH key wrapping HSM root keys | ML-KEM-1024 ML-DSA-87 PQC-enabled custody HSMs | |
| Energy / Critical Infrastructure | ENERGY-001 | Power grid SCADA quantum vulnerability: IEC 62351 specifies security for power system communications (DNP3, IEC 61850, I... Source: IEC 62351 Power Systems Security Standards | Critical | RSA-2048 in SCADA authentication ECDSA in IEC 61850 DNP3 Secure Authentication | IEC 62351 quantum update ML-DSA for SCADA authentication hybrid protocols | |
| Energy / Critical Infrastructure | ENERGY-002 | Nuclear facility digital I&C quantum exposure: NRC 10 CFR 73.54 requires cybersecurity for nuclear power plant digital i... Source: NRC Cybersecurity Requirements (10 CFR 73.54) | Critical | Safety system digital I&C cryptography nuclear safeguards data encryption | Defense-in-depth with ML-KEM/ML-DSA CNSA 2.0 compliance for nuclear systems | |
| Energy / Critical Infrastructure | ENERGY-003Updated | Smart grid quantum security research: University of Toronto CA$1.45M research project identifies real-time quantum attac... Source: University of Toronto Smart Grid Security Research | Critical | AMI mesh networking smart meter PKI PMU authentication distribution automation | Quantum-safe AMI protocols IEC 62351 PQC update constrained device PQC | |
| Energy / Critical Infrastructure | ENERGY-004 | Pipeline and oil/gas SCADA quantum vulnerability: IEC 62443 governs industrial automation security for natural gas, oil,... Source: IEC 62443 Industrial Automation Security | High | ICS/SCADA protocols VPN encryption for pipeline monitoring RTU authentication | IEC 62443 PQC update hybrid VPN protocols ML-DSA for RTU authentication | |
| Financial Services / Banking | FIN-001Updated | BIS Project Leap quantum-safe payment system cryptography: Phase 2 launched July 2025 with Bank of Italy, Bank of France... Source: Bank for International Settlements Project Leap Phase 2 | Critical | Payment system infrastructure cross-border settlement RSA-2048 ECDSA TLS legacy | ML-KEM-1024 ML-DSA-87 hybrid TLS 1.3 HQC | |
| Financial Services / Banking | FIN-002 | Harvest Now Decrypt Later (HNDL) attacks targeting long-lived financial data including transaction records and settlemen... Source: Federal Reserve Board FEDS Paper September 2025 | Critical | RSA-2048 ECDSA ECDH ECC-256/384 | ML-KEM-1024 ML-DSA-87 SLH-DSA AES-256 | |
| Financial Services / Banking | FIN-004 | HSM backup key extraction vulnerability: Master encryption keys wrapped with RSA in HSM backup archives become recoverab... Source: NIST SP 800-227 KEM Recommendations | Critical | RSA key wrapping in HSM backups ECDH key agreement archived master keys | ML-KEM-1024 per NIST SP 800-227 AES-256-GCM key wrapping | |
| Financial Services / Banking | FIN-003 | G7 Cyber Expert Group PQC roadmap: January 2026 statement coordinated by U.S. Treasury and Bank of England establishes G... Source: G7 Cyber Expert Group Statement (U.S. Treasury) | High | G7 financial infrastructure cross-border payment systems correspondent banking TLS | ML-KEM ML-DSA hybrid implementations coordinated G7 PQC standards | |
| Financial Services / Banking | FIN-005Updated | FS-ISAC PQC migration urgency warning: Financial Services Information Sharing and Analysis Center (September 2025) warns... Source: FS-ISAC — The Timeline for Post Quantum Cryptographic Migration | High | RSA ECC TLS 1.2/1.3 key exchange PKI certificates across financial infrastructure | ML-KEM ML-DSA hybrid implementations immediate cryptographic inventory | |
| Government / Defense | GOV-001 | HNDL on classified data: TOP SECRET information requiring 25-75+ year protection is actively harvested for future quantu... Source: NSA CNSA 2.0 Cybersecurity Advisory | Critical | RSA-2048/4096 ECDH P-384 ECDSA | ML-KEM-1024 ML-DSA-87 AES-256 | |
| Government / Defense | GOV-002Updated | CNSA 2.0 compliance deadline pressure: NSA mandates CNSA 2.0 compliance with phased deadlines — software/firmware signin... Source: NSA CNSA 2.0 Guidance | Critical | Federal PKI NSS communications classified systems defense supply chain | FIPS 140-3 validated PQC modules CMVP certification acceleration | |
| Government / Defense | GOV-005 | Nuclear command and control quantum exposure: NC3 (Nuclear Command, Control, and Communications) systems operate on 50+ ... Source: NSA CNSA 2.0 Cybersecurity Advisory | Critical | All public-key cryptography in NC3 systems strategic communications encryption | CNSA 2.0 full suite AES-256 ML-KEM-1024 ML-DSA-87 | |
| Government / Defense | GOV-003 | Federal PQC procurement mandate: CISA January 2026 federal buying guidance pursuant to Executive Order 14306 (June 2025)... Source: CISA Product Categories for PQC Technologies | High | COTS products federal IT infrastructure defense systems | NIST FIPS 203/204/205 compliance ACVP testing vendor PQC roadmaps | |
| Government / Defense | GOV-004 | Federal PKI signature forgery risk: Quantum-enabled impersonation of federal systems and fraudulent certificate issuance... Source: Federal PKI Policy Authority | High | RSA-2048/4096 in Federal PKI ECDSA P-256/P-384 intermediate certificates | ML-DSA-87 SLH-DSA hybrid X.509 certificates | |
| Healthcare / Pharmaceutical | HLTH-001 | HNDL on patient records: Healthcare data has lifetime sensitivity; genomic data and mental health records remain sensiti... Source: HHS HIPAA Security Rule | Critical | RSA ECDH ECDSA TLS | ML-KEM-768/1024 ML-DSA AES-256 | |
| Healthcare / Pharmaceutical | HLTH-002Updated | Healthcare cloud encryption and breach crisis: Only 4% of healthcare operators encrypted 80%+ of sensitive cloud data. T... Source: Thales 2025 Data Threat Report Healthcare Edition | Critical | EHR databases medical imaging patient portals health information exchanges cloud encryption | ML-KEM-768/1024 ML-DSA AES-256-GCM quantum-safe TLS | |
| Healthcare / Pharmaceutical | HLTH-004 | Connected medical device lifecycle quantum exposure: FDA Section 524B of FD&C Act requires cybersecurity for medical dev... Source: FDA Cybersecurity for Medical Devices | Critical | BLE cryptography TLS in medical IoT embedded ECC in implantable devices | Crypto-agile device design hybrid firmware updates ML-DSA for device authentication | |
| Healthcare / Pharmaceutical | HLTH-003 | FDA premarket cybersecurity guidance: FDA finalized guidance (September 2023) under Section 524B of FD&C Act (Consolidat... Source: FDA Premarket Cybersecurity Guidance 2023 | High | RSA-2048 ECDSA in device firmware TLS in medical devices PKI for device authentication | ML-KEM-768 ML-DSA crypto-agile firmware update mechanisms | |
| Healthcare / Pharmaceutical | HLTH-005 | Drug supply chain authentication quantum risk: Drug Supply Chain Security Act (DSCSA) mandates product serialization and... Source: FDA Drug Supply Chain Security Act (DSCSA) | High | EPCIS digital signatures TLS authentication for verification systems manufacturer PKI | ML-DSA for supply chain signing hybrid verification certificates PQC-enabled EPCIS | |
| Insurance | INS-001 | NAIC Insurance Data Security Model Law (MDL-668) quantum exposure: Adopted 2017 and enacted in 25+ states, requires encr... Source: NAIC Insurance Data Security Model Law (MDL-668) | High | RSA/ECDSA protecting policyholder data TLS for claims processing database encryption | ML-KEM for key exchange AES-256-GCM ML-DSA for document signing | |
| Insurance | INS-002Updated | New York DFS cybersecurity regulation (23 NYCRR 500) quantum gap: Requires risk assessment and encryption for financial ... Source: NY DFS Cybersecurity Regulation (23 NYCRR 500) | High | Database encryption policyholder data TLS claims management systems | PQC-enabled encryption hybrid TLS 1.3 ML-KEM key management | |
| Insurance | INS-003 | Systemic cyber risk to insurance sector: Geneva Association research identifies systemic cyber risk including quantum th... Source: Geneva Association Systemic Cyber Risk Research | High | Actuarial model encryption reinsurance platform crypto policyholder PII protection | AES-256 with ML-KEM key exchange ML-DSA for contract signing crypto-agile platforms | |
| Internet of Things (IoT) | IOT-001Updated | IoT device risk escalation: Forescout 2025 research reports overall average device risk scores increased 15% year-over-y... Source: Forescout Device Risk Research | Critical | ECDSA P-256 RSA-2048 TLS 1.2 in IoT devices device provisioning certificates | Lightweight PQC (FN-DSA SLH-DSA) hybrid schemes for constrained devices | |
| Internet of Things (IoT) | IOT-002 | Industrial IoT SCADA quantum vulnerability: IEC 62443 governs industrial automation security. OPC UA protocol uses RSA/E... Source: IEC 62443 Industrial Automation Security | Critical | OPC UA RSA/ECDSA IEC 62443 authentication industrial protocol encryption | OPC UA PQC implementation IEC 62443 quantum update hybrid industrial protocols | |
| Internet of Things (IoT) | IOT-003Updated | IoT firmware update security (IETF SUIT): The IETF SUIT working group defines firmware update architecture (RFC 9019) wi... Source: IETF SUIT Working Group (RFC 9019) | High | COSE signatures (ECDSA/EdDSA) CoAP DTLS firmware signing keys | Lightweight ML-DSA XMSS for constrained devices hybrid COSE signatures | |
| Internet of Things (IoT) | IOT-004 | Smart city infrastructure quantum vulnerability: Traffic management, public safety cameras, environmental sensors, and m... Source: ISO/IEC 30182 Smart Community Infrastructure | High | City-wide IoT mesh networking cloud gateway TLS sensor authentication municipal PKI | Quantum-safe smart city architecture hybrid mesh protocols PQC-enabled gateways | |
| IT Industry / Software | IT-001 | Open source cryptographic library PQC integration: OpenSSL 3.5 (April 2025) includes ML-KEM, ML-DSA, and SLH-DSA support... Source: OpenSSL PQC Integration | Critical | Legacy RSA/ECDSA in crypto libraries OpenSSL pre-3.5 libsodium BoringSSL | OpenSSL 3.5+ with PQC OQS provider liboqs integration | |
| IT Industry / Software | IT-002 | Certificate authority and PKI PQC transition: CA/Browser Forum must coordinate migration of the global WebPKI trust hier... Source: CA/Browser Forum PKI Standards | Critical | CA root keys (RSA-4096/ECDSA) intermediate certificates TLS server certificates S/MIME | Hybrid X.509 certificates ML-DSA CA hierarchy composite certificate standards | |
| IT Industry / Software | IT-003 | NIST FIPS 203/204/205 standardization milestone: First official PQC standards published August 2024. FIPS 203 (ML-KEM), ... Source: NIST FIPS 203/204/205 Post-Quantum Cryptography Standards | Critical | All RSA/ECDSA/ECDH implementations requiring FIPS compliance | FIPS 203 (ML-KEM-512/768/1024) FIPS 204 (ML-DSA-44/65/87) FIPS 205 (SLH-DSA) | |
| IT Industry / Software | IT-004 | Code signing and software supply chain quantum vulnerability: Software supply chain integrity depends on RSA/ECDSA code ... Source: SLSA Supply Chain Security Framework (OpenSSF) | Critical | RSA/ECDSA code signing package manager signatures CI/CD pipeline authentication | ML-DSA code signing SLH-DSA for long-term artifacts SLSA PQC integration | |
| IT Industry / Software | IT-005 | Authentication infrastructure quantum vulnerability: Enterprise authentication systems including X.509 digital certifica... Source: FIDO Alliance PQC Roadmap | High | X.509 certificates SAML assertions OAuth/OIDC tokens FIDO2 attestation keys | Hybrid certificate chains ML-DSA certificates PQC-enabled FIDO2 per FIDO Alliance roadmap | |
| Legal / Notary / eSignature | LEG-001Updated | eIDAS long-term signature vulnerability: EU Regulation 910/2014 Article 25(2) grants qualified electronic signatures leg... Source: EU Regulation 910/2014 (eIDAS) | Critical | RSA-2048/4096 ECDSA P-256/P-384 SHA-256 in AdES formats (XAdES PAdES CAdES) | ML-DSA-65/87 SLH-DSA for long-term archival signatures XMSS | |
| Legal / Notary / eSignature | LEG-002 | eIDAS 2.0 Digital Identity Wallet quantum risk: Regulation 2024/1183 (entered force May 20, 2024) amends eIDAS to mandat... Source: EU Regulation 2024/1183 (eIDAS 2.0) | High | ECDSA P-256 RSA-2048 ECDH in wallet authentication X.509 certificates | ML-DSA-65/87 ML-KEM-768/1024 hybrid signature schemes | |
| Legal / Notary / eSignature | LEG-003 | Qualified timestamp quantum forgery risk: ETSI EN 319 422 governs qualified time-stamp authorities under the eIDAS frame... Source: ETSI EN 319 422 Qualified Timestamp Policy | High | RSA-2048/4096 ECDSA P-256/P-384 in RFC 3161 timestamp tokens SHA-256 | ML-DSA-65/87 SLH-DSA for long-term timestamp integrity | |
| Legal / Notary / eSignature | LEG-004 | Court electronic evidence repudiation risk: As quantum computing advances, defense attorneys may challenge the integrity... Source: NIST SP 800-86 Guide to Integrating Forensic Techniques | High | RSA/ECDSA signatures on court filings evidence chain of custody forensic reports | PQC re-signing with archival timestamps SLH-DSA for evidence integrity | |
| Media / Entertainment / DRM | MEDIA-001Updated | Content encryption master key HNDL risk: AACS (Advanced Access Content System) protects Blu-ray and UHD content using RS... Source: AACS Licensing Administrator Specifications | Critical | AACS RSA key hierarchy PlayReady FairPlay DRM key management | AES-256 with ML-KEM key wrapping quantum-safe DRM key distribution | |
| Media / Entertainment / DRM | MEDIA-002Updated | Streaming platform DRM quantum vulnerability: Major streaming services (Netflix, Disney+, Amazon) use Widevine, PlayRead... Source: AACS / Content Protection Standards | Critical | RSA key exchange in Widevine/PlayReady/FairPlay content encryption keys license server PKI | ML-KEM key wrapping quantum-safe license distribution AES-256 content encryption | |
| Media / Entertainment / DRM | MEDIA-003 | Broadcast conditional access quantum exposure: DVB Conditional Access Systems use ECM (Entitlement Control Messages) wit... Source: ETSI DVB Conditional Access Standards | High | DVB-CSA encryption ECM RSA/ECDSA broadcast conditional access keys | AES-128/256 CAS upgrade ML-KEM for ECM distribution | |
| Payment Card Industry | PCI-001 | EMV offline authentication quantum vulnerability: EMVCo specifications use RSA as the only approved asymmetric algorithm... Source: EMVCo Book 2 Security and Key Management | Critical | RSA-1024/2048 in EMV CDA/DDA offline authentication card personalization keys | ML-DSA hybrid offline authentication FN-DSA for constrained chip environments | |
| Payment Card Industry | PCI-002 | PCI DSS 4.0.1 cryptographic gap: PCI DSS requires 'strong cryptography' for cardholder data protection but does not yet ... Source: PCI Security Standards Council DSS 4.0.1 | High | TLS protecting payment data RSA/ECDSA certificates HSM key wrapping for card data | PQC-enabled payment HSMs hybrid TLS 1.3 ML-KEM for key exchange | |
| Payment Card Industry | PCI-003 | PIN block encryption quantum vulnerability: Triple-DES DUKPT base derivation keys protecting PIN blocks at millions of p... Source: PCI PIN Security Requirements | High | 3DES DUKPT base derivation keys RSA key injection PIN encryption | AES-256 DUKPT ML-KEM key injection quantum-safe PIN encryption | |
| Rail / Transit | RAIL-001 | Railway signaling system quantum vulnerability: EN 50159 (Safety-related communication in railway systems) governs crypt... Source: EN 50159 Railway Communication Security / ERA | Critical | RSA/ECDSA in ERTMS/ETCS signaling authentication GSM-R/FRMCS encryption interlocking system crypto | ML-DSA for signaling authentication PQC-enabled FRMCS hybrid railway protocols | |
| Rail / Transit | RAIL-002 | Transit ticketing and access control quantum exposure: ISO/IEC 14443 contactless smart cards and NFC-based ticketing sys... Source: ISO/IEC 14443 Contactless Card Standards | High | Ticketing PKI key management RSA/ECDSA back-office settlement TLS mobile ticketing | ML-KEM for key management ML-DSA for PKI PQC-enabled mobile ticketing | |
| Retail / E-Commerce | RETAIL-001 | E-commerce payment flow quantum vulnerability: PCI DSS 4.0.1 requires strong cryptography for online payment processing ... Source: PCI Security Standards Council | Critical | TLS 1.2/1.3 RSA/ECDSA key exchange payment tokenization POS encryption | Hybrid TLS 1.3 with ML-KEM PQC-enabled payment gateways quantum-safe tokenization | |
| Retail / E-Commerce | RETAIL-002 | Customer data HNDL exposure: Retailers store customer PII, loyalty program data, payment history, and behavioral analyti... Source: NIST Cybersecurity Framework | High | Database encryption (RSA/ECDSA key management) CRM system TLS loyalty platform crypto | ML-KEM for database key management AES-256-GCM hybrid encryption for customer data | |
| Retail / E-Commerce | RETAIL-003 | Retail supply chain authentication: GS1 standards govern product identification and supply chain visibility for billions... Source: GS1 Global Standards | High | EDI AS2/AS4 encryption RFID authentication GS1 Digital Link signatures | ML-DSA for supply chain signing PQC-enabled EDI quantum-safe RFID | |
| Supply Chain / Logistics | SUPPLY-001 | Maritime cybersecurity quantum exposure: IMO MSC-FAL.1/Circ.3 guidelines address maritime cybersecurity. Maritime sector... Source: IMO Maritime Cyber Risk Management Guidelines | High | AIS encryption port management system PKI electronic navigation authentication | ML-DSA for maritime authentication PQC-enabled AIS quantum-safe port systems | |
| Supply Chain / Logistics | SUPPLY-002 | Electronic Bill of Lading quantum vulnerability: DCSA standards for electronic Bills of Lading (eBL) enable digital trad... Source: DCSA Electronic Bill of Lading Standards | High | eBL digital signatures (RSA/ECDSA) trade document PKI shipping platform TLS | ML-DSA for eBL signing hybrid trade document certificates PQC-enabled shipping platforms | |
| Supply Chain / Logistics | SUPPLY-003 | Customs and cross-border trade quantum risk: WCO SAFE Framework of Standards governs security and facilitation of intern... Source: WCO SAFE Framework of Standards | High | Customs declaration digital signatures AEO certificates single window system PKI | ML-DSA for customs signing PQC-enabled single window quantum-safe AEO credentials | |
| Telecommunications | TELCO-001 | HNDL on subscriber data: Mobile network operators retain call detail records, location data, and encrypted communication... Source: GSMA Security Guidelines | Critical | RSA ECDSA AES-128 (some legacy) | ML-KEM-1024 ML-DSA AES-256 | |
| Telecommunications | TELCO-002 | GSMA Post-Quantum Telco Network Taskforce: Established September 2022 to coordinate quantum-safe migration for mobile ne... Source: GSMA Post-Quantum Telco Network Taskforce | High | 5G authentication (AKA) RAN encryption IPsec/IKEv2 for network interconnects | 3GPP PQC integration ML-KEM for 5G security hybrid authentication protocols | |
| Telecommunications | TELCO-003 | 5G network security quantum vulnerability: 3GPP specifications define 5G security architecture (TS 33.501) using ECDSA a... Source: 3GPP TS 33.501 5G Security Architecture | High | 5G AKA protocol network slice authentication N2/N3 IPsec/IKEv2 RAN encryption | 3GPP Release 19+ PQC integration ML-KEM for 5G SA hybrid IKEv2 | |
| Telecommunications | TELCO-004 | SIM card and eSIM authentication quantum vulnerability: Billions of SIM cards globally use RSA-2048 or ECDSA P-256 for a... Source: GSMA eSIM Specification (SGP.22) | High | RSA-2048 ECDSA P-256 in SIM authentication eSIM remote provisioning PKI | ML-DSA for SIM authentication PQC-enabled eSIM provisioning hybrid schemes | |
| Telecommunications | TELCO-005 | 6G native PQC design window: 6G standards development (2025-2030 in 3GPP and ETSI) represents a critical opportunity to ... Source: ETSI ISG Quantum-Safe Cryptography / 3GPP | High | 6G authentication protocols air interface encryption network slicing edge computing | Native ML-KEM/ML-DSA in 6G specifications quantum-safe by design per ETSI QSC | |
| Water / Wastewater | WATER-001 | Water treatment plant SCADA quantum vulnerability: America's Water Infrastructure Act (AWIA) of 2018 requires community ... Source: EPA America's Water Infrastructure Act (AWIA) 2018 / CISA | Critical | SCADA/ICS authentication (RSA/ECDSA) VPN for remote monitoring historian database encryption | IEC 62443 PQC update for water systems ML-DSA for SCADA authentication hybrid VPN | |
| Water / Wastewater | WATER-002 | Smart water infrastructure quantum exposure: AWWA (American Water Works Association) standards govern smart water meteri... Source: AWWA Cybersecurity Guidance for Water Utilities | High | AMI mesh networking smart meter PKI SCADA remote terminal units cloud platform TLS | Quantum-safe AMI protocols ML-KEM for device provisioning constrained device PQC |