About this tool
OT communication protocols were designed for reliability and determinism in industrial environments, not for cryptographic agility. Many protocols that added security extensions over the past decade did so using classical asymmetric cryptography: elliptic curve Diffie-Hellman for key exchange, ECDSA for digital signatures, RSA for certificate signing. Shor's algorithm, running on a sufficiently capable quantum computer, breaks all three of these functions by solving the discrete logarithm and integer factorisation problems in polynomial time. This tool maps each of the twelve most widely deployed OT protocols to its cryptographic profile, identifies the specific functions that are quantum-vulnerable, and returns the available migration pathway from hybrid TLS key exchange extensions to PQC certificate replacement. Protocols with no native cryptography are assessed separately: they carry no direct quantum exposure at the protocol layer, but they present current-day interception risks that network segmentation and cryptographic gateway deployment can address. Regulatory context is generated from your country and sector: IEC 62443 Foundational Requirements, NERC CIP obligations, NIS2 Article 21(2)(h), and EU Cyber Resilience Act Annex I Section 1(3)(c) are presented as applicable. Country, sector, and protocol class counts are recorded anonymously. Individual protocol selections, company names, and personal data are not stored.
Important Information / Data Disclosure
What is stored: The following information is recorded anonymously to support industry benchmarking: country (ISO code), sector (enum value), and protocol selection summary (count per exposure class, not individual protocol names). No personal data, company name, IP address, or individual protocol details are stored. Timestamps are recorded at weekly granularity only.
What is not stored: Your name, company, email, individual protocol selections, and all other per-protocol inputs remain in your browser only. They are never transmitted to any server. The PDF report is generated entirely in your browser.
Disclaimer: This tool is a self-assessment aid. It is not a compliance attestation or security audit. Protocol vulnerability data reflects the published state of each protocol specification and available PQC migration guidance as of 2026-04-03. Verify against current published standards and vendor documentation before making investment decisions.
The Industry selection is required and recorded anonymously. Your industry may impact your score. Be sure to choose your nearest industry category.