Free Tool · Blockchain Security

Blockchain Quantum Exposure Assessment

Ten questions produce two independent quantum risk scores for your blockchain deployment. The assessment distinguishes between the signing key exposure threat : where Shor's algorithm on a cryptographically relevant quantum computer could derive private keys from permanently recorded public keys : and the encrypted data threat, where harvest-now-decrypt-later collection targets on-chain ciphertext. The two threats apply to different chain types and require different mitigations. This tool assesses each separately. No account required. Browser-only. No email or company details are transmitted or stored. Results data is anonymised.

Assessment 1: Signing Key Exposure Assessment 2: Encrypted Data HNDL Risk
Browser-only. No email or company details are transmitted or stored. Results data is anonymised. 10 questions : approx. 4 minutes Two scored assessments Aligned to NIST FIPS 203/204/205, NSA CNSA 2.0
Start Assessment Two assessments : one session
Security Team
10 questions · ~4 min

Blockchain systems face two structurally distinct quantum computing threats. Most existing blockchain risk assessments conflate them under a single score. This tool separates them, because the technical basis, the chain types affected, and the appropriate mitigations are different in each case.

Vector 1
Signing Key Exposure
Public blockchain networks record transaction data as plaintext. The primary quantum threat is Shor's algorithm applied to the elliptic curve public keys permanently recorded on-chain. A CRQC can derive the corresponding private key and forge signatures, spend outputs, or impersonate accounts.
Applies to: Bitcoin, Ethereum, public chains using ECDSA / Ed25519 / BLS12-381
Vector 2
Encrypted Data HNDL Risk
Harvest-now-decrypt-later applies where data is actually encrypted and stored on-chain. Privacy chains, enterprise permissioned chains, and zk-SNARK deployments with encrypted inputs carry this exposure. The ciphertext is permanent and cannot be deleted by the data controller.
Applies to: Hyperledger Fabric, Monero, Zcash, zk-SNARK systems, encrypted calldata

If your deployment uses a public chain without encrypted data, the HNDL score will return N/A with a brief explanation. Both scores are delivered at the end of the same session.

Why this tool separates the two vectors

A Bitcoin wallet operator assessing quantum risk needs to know whether unspent P2PK outputs are exposed to Shor-based key recovery. They do not have an encrypted data HNDL problem: there is no ciphertext. Conversely, a Hyperledger Fabric operator encrypting supply chain data on a private channel has an HNDL problem, but not a signing key exposure problem in the same sense. Conflating these vectors produces a single score that is misleading for both operator types.

Tool Logic

This tool calculates two independent risk scores from ten weighted questions. Each score maps to a five-tier risk level: Negligible, Low, Moderate, High, Critical. The weightings reflect the Mosca inequality framework, NIST FIPS 203/204/205, and NSA CNSA 2.0 migration guidance.

Assessment 1: Signing Key
Signature Scheme 35%
ECDSA secp256k1 and Ed25519 score highest risk. Post-quantum schemes (ML-DSA, SLH-DSA) score lowest.
Public Key Exposure History 30%
The proportion of signing keys permanently recorded on-chain via spent outputs or transaction history.
zk-Proof System 25%
BLS12-381 pairing-based SNARKs are a Shor target. Hash-based STARKs carry lower quantum exposure.
Migration Maturity 10%
Active ML-DSA or SLH-DSA migration reduces the forward exposure score, not the historical exposure residual.
Assessment 2: HNDL Risk
Encryption Posture 30%
ECDH and RSA key encapsulation are directly broken by Shor. ML-KEM (FIPS 203) is not vulnerable.
Data Confidentiality Lifetime 25%
The Mosca inequality variable. Longer confidentiality lifetimes increase HNDL exposure given current CRQC timeline estimates.
Chain Type Variable
Determines whether Vector 2 is applicable. Public chains without encrypted data return N/A.
Migration Maturity 10%
ML-KEM migration for new data prevents the exposure window growing. Historical records already on-chain remain exposed.
Important Information

No email or company details are transmitted or stored. Anonymised country, industry, and results data are recorded for sector-level benchmarking. No account is required.

Your quantum risk scores are calculated from your assessment answers. No personal identifiers, company name, or IP address are associated with the anonymised data recorded.

If you choose to download your results as a PDF, that file is generated on your device. No email or company details are transmitted or stored by Quantum Security Defence.

For questions about how Quantum Security Defence handles personal data in other contexts, see our privacy policy.

Assessment Progress Step 1 of 10
Context. Step 1 of 11
Your Country
Country is recorded anonymously for industry-level reporting and to tailor regulatory context to your jurisdiction.

Country is recorded anonymously for industry-level reporting only. No email, name, or company details are transmitted or stored.

Assessment Details
Vectors 2 : Signing Key + Encrypted Data
Questions 10 total (up to 7 per vector)
Duration Approximately 4 minutes
Output Two scored results + PDF report
Standards NIST FIPS 203/204/205, NSA CNSA 2.0, Mosca Inequality
Account Not required
Threat Vectors Covered
Authentication: Signing Key Exposure
Confidentiality: Encrypted Data HNDL
Output Tiers (per assessment)
Each assessment returns one of five exposure levels
Negligible
Score 20–29 · Quantum-resistant or minimal attack surface
Low
Score 30–44 · Non-zero risk; migration planning required
Moderate
Score 45–59 · Known vulnerabilities; active programme recommended
High
Score 60–74 · Significant risk; immediate migration required
Critical
Score 75–100 · Immediate action required on this vector
Trusted Companies
Expert Members advising on blockchain PQC migration
Quantum Resistant Ledger
Post-quantum blockchain infrastructure
Switzerland PQC-Native
IOTA Foundation
Quantum-secure DLT research
Germany DLT
PKI Consortium
PQC standards and blockchain key management
Netherlands Standards
Evolveum
Enterprise identity and crypto agility
Slovakia IAM
Disclaimer
This tool produces directional indicators only. Results are not a formal security audit, legal advice, or compliance certification. Engage qualified quantum security specialists for critical infrastructure assessments.
Need expert analysis?

Get a structured blockchain quantum risk assessment from a QSECDEF Expert Member

This tool provides a directional score. A formal assessment covers your full key exposure inventory, migration architecture, and regulatory obligations under DORA, NIS2, and CNSA 2.0.

QSECDEF Research Briefings
Blockchain quantum risk: what changes in 2026

Monthly briefings on post-quantum migration timelines, NIST standard updates, and practical PQC implementation guidance for blockchain engineers and security architects.

  • CRQC timeline updates and threat model revisions
  • NIST FIPS 203/204/205 implementation news
  • Blockchain-specific PQC migration case studies
  • 1,200+ member community : 40+ countries
Anonymised country, industry, and results data are recorded for sector-level benchmarking. Your personal details are never shared.