Free Tool · Blockchain Security

Blockchain Quantum Exposure Scanner

Eight questions across six scored dimensions produce a directional quantum exposure score for your blockchain deployment. No account required. No email or company details are transmitted or stored. Results data is anonymised.

8 questions · under 4 minutes 6 scored dimensions 5 exposure tiers NSA CNSA 2.0 · NIST FIPS 204/205 Browser-only. No email or company details are transmitted or stored. Results data is anonymised.
Security Teams

About this tool

This tool scores your blockchain deployment's quantum exposure across six weighted dimensions: chain type and signature scheme, network structure and governance, on-chain data sensitivity, Harvest Now, Decrypt Later (HNDL) exposure, migration complexity, and key management practices. The scoring model is grounded in NIST post-quantum cryptography standards (FIPS 203, FIPS 204, FIPS 205) and the NSA CNSA 2.0 migration framework, and reflects the specific risk that Shor's algorithm, executed on a cryptographically relevant quantum computer, can recover ECDSA or RSA private keys from public keys, breaking the signature security that underpins every major blockchain protocol. Eight questions produce a directional exposure tier and sector-specific migration guidance. The output is an assessed exposure estimate, not a formal security audit; it does not inspect node software, key management infrastructure, or smart contract code.

How the scoring works

This tool calculates an exposure score from six weighted dimensions. Chain type and on-chain data sensitivity each carry the highest individual weight because, in combination, they determine both the severity of a quantum compromise and the difficulty of preventing it.

The scoring formula: Score = (Chain type × 0.20 + Network structure × 0.15 + Data sensitivity × 0.20 + HNDL exposure × 0.15 + Migration complexity × 0.20 + Key management × 0.10) × 20.

Chain type and signature scheme (weight: 20%): the protocol your deployment uses and its underlying signature algorithm. ECDSA on secp256k1 or P-256 is the most widely deployed signature scheme across major blockchain protocols and is directly vulnerable to Shor's algorithm. RSA-based signing faces the same threat. Chains using ed25519 or post-quantum signature schemes are materially better positioned. Permissioned enterprise chains with known participants have a narrower and more governable migration scope than permissionless public chains with thousands of anonymous validators.

Network structure and governance (weight: 15%): the size and governance model of your validator or participant set. A migration to quantum-safe signature schemes requires coordinated protocol upgrades across all nodes. A small permissioned network with a defined governance process can execute a hard fork or protocol upgrade on a planned schedule. A global public chain with anonymous validators, contentious governance history, and diverse node software versions faces a migration coordination problem that has no clear precedent. Governance capacity is a primary constraint on how quickly migration is achievable even after post-quantum standards are finalised.

On-chain data sensitivity (weight: 20%): the sensitivity of the information recorded on-chain. Data that is permanently immutable on-chain cannot be deleted if future decryption becomes possible. Sensitivity determines what the consequence of retrospective exposure is.

HNDL exposure (weight: 15%): whether the transaction data, smart contract state, or off-chain data referenced by on-chain records is subject to Harvest Now, Decrypt Later collection. The chain's immutability means historical transactions are available indefinitely for retrospective decryption once a CRQC is operational.

Migration complexity (weight: 20%): the practical difficulty of migrating your deployment to quantum-safe algorithms. Factors include whether participants can coordinate a protocol upgrade, whether smart contracts would need to be redeployed, whether hardware wallets or HSMs need firmware updates, and whether cross-chain interoperability would be broken by an asymmetric migration.

Key management practices (weight: 10%): how private keys are generated, stored, and rotated in your deployment. Keys derived from BIP32/BIP39 hierarchical deterministic wallets expose every derived key once a master key is compromised.

Important Information About How We Use This Data

No account is required. Anonymised results are recorded for sector-level benchmarking.

Anonymised country, industry, and results data are recorded for sector-level benchmarking. No email, name, or company details are transmitted or stored. Individual respondents cannot be identified from the anonymised data.

If you choose to download your results as a PDF, that file is generated locally in your browser. Your name and company (if entered) are used only for the PDF and are not transmitted to any server.

For questions about how Quantum Security Defence handles personal data, see our privacy policy.

Blockchain Quantum Exposure Scanner

Eight questions. Results are a directional exposure tier with sector-specific guidance.

Step 1 of 8 13%
Your Organisation

Which sector best describes your blockchain deployment?

Select the sector that best describes the primary use case of this blockchain deployment. Sector determines which regulatory frameworks and migration obligations are most relevant to your deployment, and which sector-specific context appears on your results page.

Country
QSECDEF Sector

The Industry selection is required and recorded anonymously. Your industry may impact your score. Be sure to choose your nearest industry category.

Step 1 of 8

Need expert guidance?

Commission a formal blockchain quantum migration assessment

Our PQC migration specialists work with financial institutions, enterprise blockchain operators, and government agencies on quantum cryptographic risk programmes. We can assess your deployment's full migration path and build a phased delivery roadmap.

Book a Consultation