Quantum Readiness Survey
1. Do you use HTTPS with RSA or ECDHE key exchange?
π€
RSA and ECDHE are vulnerable to Shor's algorithm. This checks if your website or service still relies on them.
Yes
No
Not Sure
2. Are you using a version of OpenSSH older than 9.0?
π€
OpenSSH versions before 9.0 do not support post-quantum key exchange hybrids.
Yes
No
Not Sure
3. Do your VPNs rely on classic DH or ECDH?
π€
VPN protocols using classic DH or ECDH are broken by quantum attacks. This includes many IPsec and WireGuard setups.
Yes
No
Not Sure
4. Are RSA or ECC keys used in long-lived systems (e.g. firmware)?
π€
Systems like firmware and embedded devices often use long-lived keys that canβt be easily upgraded later.
Yes
No
Not Sure
5. Do you use PGP/GPG with RSA or ECC keys?
π€
PGP and GPG mostly use RSA or ECC, which will be broken by quantum computers.
Yes
No
Not Sure
6. Is your code signing still using RSA or ECDSA?
π€
Many code signing systems use vulnerable algorithms. If broken, attackers could forge software updates.
Yes
No
Not Sure
7. Do you interact with blockchains like Bitcoin or Ethereum?
π€
Public keys exposed on-chain are vulnerable to quantum attacks after transaction broadcast.
Yes
No
Not Sure
8. Are any secure chats encrypted with ECDH/ECDSA and stored somewhere?
π€
If messages are recorded, ECDH/ECDSA means they can be decrypted later by quantum computers.
Yes
No
Not Sure
9. Have you reviewed or started to implement post-quantum cryptography?
π€
Post-quantum algorithms like Kyber and Dilithium are designed to resist quantum attacks.
Yes
No
Not Sure
10. Do you have a 12-month plan for PQC migration?
π€
Planning migration now will prevent disruption and secure your systems against future threats.
Yes
No
Not Sure
Evaluate