Assessment

QUANTUM READINESSASSESSMENT

Know your quantum risk before you build your migration plan. Petronella Technology Group conducts a structured five-phase assessment that identifies every vulnerable system and prioritizes your migration path.

CMMC-AB RPO #1449|BBB A+ Since 2003|Founded 2002|NIST FIPS 203/204/205 Aligned|NSA CNSA 2.0
CMMC-AB RPO #1449 BBB A+ Since 2003 NIST PQC Aligned NSA CNSA 2.0 Applied Cryptography Experience
Process

What Is the Five-Phase Quantum Readiness Assessment?

A structured five-phase engagement: cryptographic discovery, quantum-vulnerability classification against NIST FIPS 203/204/205/206, data sensitivity and lifetime analysis, gap analysis against the NIST Post-Quantum Cryptography standards, and a prioritized migration roadmap you can budget and schedule.

01

Cryptographic discovery across all systems

02

Vulnerability classification by algorithm

03

Data sensitivity and lifetime analysis

04

Gap analysis against PQC standards

05

Prioritized migration roadmap

Who Needs This

Who Needs a Quantum Readiness Assessment?

Any organization with encrypted data that must stay confidential for five or more years. That includes defense contractors under CMMC, healthcare providers handling protected health information, financial institutions, state and local government, and critical infrastructure operators.

Defense Contractors Healthcare Organizations Financial Services Government Agencies Critical Infrastructure Any Organization with Long-Lived Data
Why Assess Now

Why Does Quantum Risk Assessment Matter in 2026?

NIST finalized FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA) in August 2024. NSA CNSA 2.0 sets a 2035 deadline for National Security Systems. Harvest-now-decrypt-later attacks already target long-lived encrypted data. A 2026 start gives organizations three planning cycles to migrate thoughtfully.

Most cryptographic systems in production today use algorithms that will be broken by a sufficiently capable quantum computer. RSA, ECDSA, ECDH, and Diffie-Hellman all fall to Shor's algorithm. AES-128 loses roughly half its effective security against Grover's algorithm, which is why the National Security Agency now recommends AES-256. SHA-256 remains viable with adjusted output sizes. Every organization that stores encrypted data, issues digital certificates, or operates a public key infrastructure is affected.

The National Institute of Standards and Technology (NIST) finalized three post-quantum cryptography standards in August 2024 after nearly a decade of public review. FIPS 203 standardized ML-KEM, the lattice-based key encapsulation mechanism originally submitted as CRYSTALS-Kyber. FIPS 204 standardized ML-DSA, the lattice-based digital signature algorithm originally submitted as CRYSTALS-Dilithium. FIPS 205 standardized SLH-DSA, a stateless hash-based signature scheme originally submitted as SPHINCS+. A fourth algorithm, FN-DSA (originally Falcon), is expected to be finalized as FIPS 206. These four standards define the migration path for every public-sector system and are already influencing requirements across regulated industries.

The threat window is not theoretical. The Department of Homeland Security and NIST have repeatedly warned about harvest-now-decrypt-later attacks, where adversaries capture encrypted traffic today and hold it until quantum computers capable of breaking RSA and ECC become available. If your data has a confidentiality lifetime measured in years or decades, such as trade secrets, patient records, classified material, or long-term contracts, that data is already exposed in practice. You do not get to decide the timeline of the threat. You only decide how ready you are when it arrives.

Our assessment builds the foundation you need to plan, budget, and execute. We do not sell panic and we do not sell hype. We document what you actually run, we rank it by risk, and we hand you a roadmap that finance, engineering, and compliance can all sign.

Methodology

How Does the Quantum Readiness Assessment Work?

Five phases run over 4 to 8 weeks: cryptographic discovery, vulnerability classification, data sensitivity and lifetime analysis, gap analysis against NIST FIPS 203/204/205 and NSA CNSA 2.0, and a prioritized migration roadmap with budget ranges for each phase.

Phase 1: Cryptographic Discovery

We inventory every place cryptography lives in your environment. That includes TLS configurations on every public and internal endpoint, certificate authorities and the certificates they have issued, SSH server and client configurations, VPN tunnels using IPsec or WireGuard, code signing keys, document signing keys, database encryption keys, object storage encryption, hardware security modules, payment processing paths, and any bespoke application-layer encryption. We use a combination of network scanning, certificate transparency log review, configuration file parsing, and guided interviews with engineering leads. The output is a living inventory that separates algorithm, key length, key management method, and data lifetime for every distinct cryptographic instance.

Phase 2: Vulnerability Classification

Each discovered cryptographic instance gets classified against the quantum threat model. Algorithms used for key exchange and digital signatures (RSA, ECDSA, ECDH, DH) are flagged as quantum-vulnerable because Shor's algorithm breaks them efficiently. Symmetric algorithms like AES-128 are flagged as partially exposed under Grover's algorithm and we recommend migration to AES-256 where performance allows. Hash functions are evaluated against the specific way they are used. We also flag configuration choices that compound quantum risk, such as long-lived static DH parameters, pinned certificates with decade-plus validity, or RSA-2048 trust anchors that cannot be rotated without major vendor changes.

Phase 3: Data Sensitivity and Lifetime Analysis

Risk is not just algorithm choice. It is algorithm choice multiplied by what the data is worth and how long it stays sensitive. We work with legal, compliance, and business owners to assign each protected data class a confidentiality lifetime. Controlled Unclassified Information under CMMC has different requirements than HIPAA protected health information, and both differ from trade secrets or intellectual property. We rank every cryptographic instance by the combined exposure of the algorithm weakness and the data lifetime so that migration priorities match business impact, not just technical severity.

Phase 4: Gap Analysis Against PQC Standards

With a classified inventory in hand, we run a gap analysis against NIST FIPS 203, 204, and 205. We identify which systems can accept a drop-in swap to ML-KEM or ML-DSA, which need hybrid deployments combining classical and post-quantum algorithms during transition, and which require vendor intervention because the underlying product has not yet shipped PQC support. We also map obligations under NSA CNSA 2.0, NIST SP 800-131A, and any sector-specific guidance such as payment card industry or federal cloud requirements. The gap analysis is what turns a general awareness of quantum risk into a list of specific work items your team can estimate and schedule.

Phase 5: Prioritized Migration Roadmap

The final deliverable is a multi-year migration roadmap with concrete phases, ownership, budget ranges, and sequencing logic. We recommend quick wins first, typically TLS and certificate authority modernization where hybrid key exchange is already supported, followed by code signing and document signing, then application-layer encryption, and finally bulk data re-encryption where the scale is large. We document dependencies on vendor roadmaps, hardware refresh cycles, and compliance deadlines. The roadmap becomes a living document that your program office can use to track progress quarter over quarter.

What You Get

Assessment Deliverables

Cryptographic Asset Inventory

A complete spreadsheet and searchable database of every discovered cryptographic instance. Covers algorithm, parameters, key length, protocol context, data classification, expected rotation, and owner. This artifact alone often pays for the engagement because most organizations have never had an accurate picture of their own crypto posture.

Vulnerability and Risk Report

A narrative report written for a mixed technical and executive audience. Explains the quantum threat in plain language, summarizes your exposure by business unit, and calls out the three to five findings that need executive attention. Includes references to NIST, NSA, and CISA guidance so that your auditors can see the underlying basis for every recommendation.

Migration Roadmap and Budget Model

A phased roadmap with budget envelopes for each phase. The budget model separates labor, hardware refresh, vendor subscription changes, and contingency. We calibrate the estimate to your internal cost structure so that finance can plan without surprises.

Executive Briefing

A live executive briefing with your leadership team at the close of the engagement. We walk through the findings, answer questions, and hand off the artifacts to the team that will own the migration. Every report we produce comes with a follow-up call at the 90-day mark to check on adoption.

Risk Model

The Quantum Threat Model in Plain Language

Peter Shor published his factoring algorithm in 1994. Running on a sufficiently large error-corrected quantum computer, Shor's algorithm factors large integers and solves the discrete logarithm problem in polynomial time. Everything your PKI trusts depends on those two problems being hard. RSA signatures, RSA key transport, Diffie-Hellman over finite fields, elliptic curve Diffie-Hellman, and ECDSA signatures all fail under Shor. We do not know exactly when a quantum computer large enough to run Shor at useful scale will exist, and responsible researchers give ranges rather than dates. What we do know is that the planning horizon for a major enterprise cryptography migration is measured in years, and the cost of waiting until a working attack is public is far higher than the cost of moving now.

Lov Grover's 1996 algorithm is a smaller but still meaningful threat. Grover provides a quadratic speedup on unstructured search, which means symmetric keys effectively lose half their bit security against a quantum attacker. AES-128 becomes roughly 64-bit secure under Grover, which is why NSA CNSA 2.0 requires AES-256. The practical impact for most organizations is that any AES-128 deployments should be scheduled for migration to AES-256, that SHA-256 remains acceptable for most purposes but SHA-384 or SHA-512 becomes the conservative choice for long-lived signatures, and that key derivation chains using 128-bit security levels should be revisited.

Harvest-now-decrypt-later is the scenario that drives urgency. An adversary captures encrypted traffic or encrypted archives today, stores them cheaply, and decrypts them once quantum capability is available. The public was reminded of this when the National Academies report on quantum computing and the CISA Post-Quantum Cryptography Initiative both explicitly called out the threat. If your data has a confidentiality lifetime longer than the expected horizon to a cryptographically relevant quantum computer, that data is already compromised from an operational security perspective. The only defense is to migrate the cryptography now and rotate the data keys.

References

Authoritative References We Cite

NIST Post-Quantum Cryptography Project

The authoritative source for PQC standardization progress, rationale for algorithm choice, and transition guidance. Every assessment we deliver cites the current state of FIPS 203, 204, 205, and 206 along with NIST SP 800-131A and NIST IR 8547.

NSA Commercial National Security Algorithm Suite 2.0

The NSA CNSA 2.0 announcement sets the 2035 transition deadline for National Security Systems and is the strongest near-term driver of PQC adoption for defense contractors and federal agencies. We reference CNSA 2.0 in every assessment for CMMC or federal clients.

CISA Post-Quantum Cryptography Initiative

CISA publishes planning guidance tailored to critical infrastructure sectors. For utility, transportation, water, and energy clients we integrate CISA sector-specific recommendations into the final roadmap.

White House National Security Memorandum 10

NSM-10 directed federal agencies to inventory cryptographic systems and plan migration. Even for non-federal clients, NSM-10 is useful as a template for the inventory format that regulators are likely to expect.

Timing

Why Starting in 2026 Is the Right Window

The NSA Commercial National Security Algorithm Suite 2.0 sets a transition deadline of 2035 for National Security Systems. Most sectors will see compliance requirements tighten well before that date. CISA has been publishing preparatory guidance for critical infrastructure since 2022, NIST IR 8547 outlines the transition from classical to post-quantum standards, and the White House issued National Security Memorandum 10 in 2022 directing federal agencies to begin the migration.

For most private sector organizations, the practical window to complete a thoughtful migration runs from now through roughly 2030. Starting the inventory phase in 2026 gives you three planning cycles to resolve vendor dependencies, complete one hardware refresh cycle with PQC-capable gear, and train staff on the new primitives before regulatory pressure forces a rushed cutover. Organizations that wait until 2029 or 2030 to start are going to pay a premium for emergency services and will have fewer vendor options.

We work primarily with defense contractors under CMMC scope, healthcare providers governed by HIPAA, financial institutions, and state and local government. Each sector has its own timeline pressure. The CMMC compliance pipeline is the most predictable because CNSA 2.0 mandates are explicit. HIPAA and payment card requirements are less explicit but are tightening as examiners and insurers begin asking about quantum readiness. In every case the answer is the same: inventory first, then you know what you are dealing with.

Outcomes

What Our Clients Do With the Assessment

Once the assessment is complete, clients generally take one of three paths. Some hand off the roadmap to their internal security engineering team and run the migration in-house, using our findings as the charter for a multi-year program. Some engage us for the next phase, which typically means post-quantum cryptography migration implementation against specific subsystems, or crypto agility consulting to design the abstraction layers that will make future algorithm swaps painless. Some combine the assessment with a broader cybersecurity program review to make sure their overall security posture aligns with the quantum-era roadmap.

For regulated clients, the assessment also doubles as compliance evidence. Auditors reviewing your cybersecurity program will ask about quantum readiness within the next two assessment cycles. Having a dated, signed cryptographic inventory and a board-approved migration roadmap is the simplest way to answer that question with confidence. We format our deliverables so they drop directly into your existing governance documentation.

If you want a walkthrough before committing, we offer a free fifteen-minute quantum risk consultation with our team. We will review your sector, talk through the likely scope, and give you an honest answer about whether an assessment makes sense this year or if there are higher-leverage cybersecurity investments to make first. Call 919-348-4912 or reach us through the contact form.

Sector Detail

How the Assessment Adapts by Sector

We have run quantum readiness assessments across defense, healthcare, financial services, and state and local government. The methodology stays constant but the emphasis shifts. Defense contractors under the Cybersecurity Maturity Model Certification framework get a heavier focus on how NSA CNSA 2.0 affects their Controlled Unclassified Information handling, how the Defense Industrial Base Cybersecurity Strategy frames quantum risk, and how the contract flowdown language from prime contractors is likely to evolve. Healthcare clients get deeper analysis of electronic protected health information storage lifetimes, the implications of long-retention imaging data, and how the Office for Civil Rights is likely to interpret encryption requirements as standards shift. Financial services clients get particular attention on interbank messaging, PKI for payment cards, long-term archival of customer records, and the forward-looking guidance from the Federal Financial Institutions Examination Council and the Payment Card Industry Security Standards Council. For government clients we map findings to the White House National Security Memorandum 10 inventory format so that the output can be reused for federal reporting.

Every sector has legacy systems that cannot be upgraded on a normal cadence. Healthcare has medical devices with firmware that vendors may not patch for years. Financial services has mainframe and HSM dependencies that move slowly. Defense has programs of record with multi-decade lifetimes. We call these out early in the inventory so that roadmap decisions account for them, and we include vendor engagement strategies in the final deliverable so that your procurement team has a template for asking vendors about their post-quantum cryptography roadmap.

Organizations with overlapping frameworks, such as a defense contractor that also handles HIPAA data through a subsidiary, get a combined findings report that respects the strictest applicable control. We do not treat each framework as a separate exercise. We map once and report the projection into each framework the client cares about.

Team

Who You Work With

Petronella Technology Group was founded in 2002 and has been serving regulated clients in the Raleigh and Research Triangle area for more than two decades. Our team holds CMMC Registered Practitioner credentials across the board, and Craig Petronella personally holds CMMC-RP, Certified Forensic Examiner (DFE 604180), CCNA, and CWNE credentials. We are a Better Business Bureau A+ accredited business since 2003 and a CMMC-AB Registered Provider Organization under RPO-1449. We hold a Private Protective Services Board accreditation in North Carolina, which is relevant for clients in financial or legal sectors who require cleared practitioners for incident response or digital forensics adjacent work.

Quantum readiness assessments are led by senior consultants with applied cryptography experience, not by junior analysts running scripts. We pair a lead consultant with an engineering associate for larger environments, and we maintain the same team for the full duration of the engagement. You will not be handed off between account managers, and the person who signs the final report is the same person who interviewed your engineering leads on day one.

FAQ

Frequently Asked Questions

How long does the assessment take?

A typical quantum readiness assessment takes 4 to 8 weeks depending on the size of your environment and the number of systems to inventory. Smaller organizations with a single data center and a handful of public endpoints usually complete in 4 to 5 weeks. Larger enterprises with multiple business units, several clouds, and hundreds of services take the full 8 weeks and sometimes longer. We scope the timeline during a discovery call before you commit.

What do we get at the end?

You receive a complete cryptographic inventory, a vulnerability classification report aligned with NIST and NSA guidance, a risk-prioritized migration roadmap with budget ranges, and an executive summary written for the board. We also schedule a follow-up session 90 days after delivery to check on adoption and adjust the roadmap if business priorities have shifted.

Do we need to stop using our current encryption?

No. The assessment identifies what to migrate and when. You continue using existing encryption while building a phased migration plan. Hybrid approaches, where classical and post-quantum algorithms run side by side during transition, allow a gradual move without breaking compatibility with vendors and partners who have not yet adopted post-quantum cryptography.

Which NIST standards does the assessment cover?

We align findings and recommendations with FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA), the draft FIPS 206 (FN-DSA), NIST Special Publication 800-131A for transition guidance, NIST IR 8547 for transition planning, and NSA Commercial National Security Algorithm Suite 2.0. If you have sector-specific guidance, such as CMMC, HIPAA, PCI DSS, or FedRAMP, we map findings against those as well.

Is quantum key distribution part of this assessment?

Quantum key distribution (QKD) is a separate class of technology that uses physical properties of photons rather than mathematics to distribute keys. For most enterprises, post-quantum cryptography is a better fit than QKD because it runs on existing networks and hardware. We note QKD as an option in the final roadmap for clients that have very specific high-assurance use cases, but we do not sell QKD hardware and we do not recommend it as a general-purpose replacement for classical key exchange.

Can you work under NDA or security clearance?

Yes. We regularly operate under mutual NDA for commercial work. Our team includes CMMC Registered Practitioners and we are a CMMC-AB Registered Provider Organization (RPO-1449), which is relevant for defense contractor engagements. If your environment requires cleared personnel, we scope that separately.

Get Started

Assess Your Quantum Risk

Start with a quantum readiness assessment to understand your exposure and build a migration roadmap.