0xA4F2
0x3C8B
0xDE1F

Security Teams · Free Tool

Cryptographic Asset
Prioritisation Matrix

Select the cryptographic asset categories your organisation manages. Answer three questions per asset. The tool produces a ranked migration sequence with a phase timeline and per-asset guidance. No account required. Nothing is transmitted.

Security Teams
About this tool

Post-quantum cryptography migration is not a single event. Organisations responsible for protecting data or operating secure communications infrastructure must replace quantum-vulnerable public-key algorithms across a heterogeneous estate of systems, each with different key lifetimes, different replacement lead times, and different data sensitivity profiles. NIST published FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA) in August 2024. Those publications established the first formal quantum-resistant standards for public-key cryptography. Many organisations now face a migration obligation across multiple asset categories simultaneously and need a principled method for deciding where to start.

This tool produces a ranked migration sequence. It is a prioritisation instrument, not a risk assessment. It does not calculate your organisation's aggregate exposure to quantum threats, assess compliance status, or enumerate vulnerabilities. What it does is take the cryptographic asset categories you have declared, score each one across three factors, and return them in the order in which migration effort should be directed.

The three factors are asset lifetime, replacement lead time, and data sensitivity. They are weighted 30%, 35%, and 35% respectively. Replacement lead time and data sensitivity receive the highest weights because one determines when migration must begin and the other determines the consequence of delay. Asset lifetime contributes to the harvest-now-decrypt-later (HNDL) exposure window: long-lived keys remain active for extended periods and accumulate interception risk across their entire active life. The data sensitivity scoring scale uses the values 1, 2, 4, and 5. There is no value of 3. The gap is deliberate. The qualitative difference between moderate and high data sensitivity is consequential in the PQC threat context and the scale reflects this.

Assets are scored and ranked highest-first. Four priority bands group the output: Immediate, High, Standard, and Low. A phase timeline groups the same assets by recommended programme sequence. For each asset, an expandable detail row shows the three sub-scores, identifies the primary score driver, and gives a practical first step.

The scoring model draws on NIST SP 1800-38 series (Migration to Post-Quantum Cryptography), NSA CNSA 2.0 transition guidance, and NCSC quantum security migration planning guidance. Reference replacement lead times for each asset category are drawn from current vendor roadmaps and implementation experience across a range of organisation sizes and infrastructure types.

Important Information About How We Use This Data

Quantum Security and Defence does not collect, associate, or retain your name or your company name when you use these tools. All information is stored only for the duration of the browser session.

We collect only country, industry, and results data. This information is anonymised and cannot be associated with you or your company. Such anonymised data may be used for industry-level reporting, shared with members, incorporated into our research, and provided to government departments to support lobbying activity and the communication of industry readiness.

By using this tool, you consent to the provision of results data on a strictly anonymised basis. No personal name, email address, or company name is stored.

Complete the Assessment
STEP-BY-STEP  ·  RESULTS ON THIS PAGE  ·  NO ACCOUNT REQUIRED
Step 1 of 4+ Starting
Context. Step 1 of 4+

Your Country

Country is recorded anonymously for industry-level reporting only.

Context. Step 2 of 4+

Your Industry

Required to calculate your score, recorded anonymously.

If your industry includes Defence, Space, Intelligence, or Government departments, select 'Defence' or 'Public administration'. These industries face earlier compliance deadlines under frameworks such as CNSA 2.0.

Industry selection is required and recorded anonymously. It does not affect the priority score.

About You. Step 3 of 4+

About You

Not recorded. Only used to create your PDF report in the browser session.

Not recorded. Only used to create your PDF report in the browser session.

Name and company are used only within your browser session. They are not stored or transmitted.

Step 4: Asset Selection

Which types of cryptographic assets does your organisation manage?

Select every category that applies. The tool will ask three questions about each one. If you are uncertain whether a category applies to your organisation, include it. You can revise your answers before viewing results.

Nothing is transmitted from your browser.

Post-Quantum Cryptography Advisory

Need help sequencing your PQC migration programme?

Quantum Security Defence advises security teams and boards on post-quantum cryptography readiness. From initial asset inventory through to migration programme governance, CNSA 2.0 compliance, and NIST FIPS 203/204/205 implementation.

Speak to the team