Workshop Description
Most defence organisations cannot answer a basic question: where is classical cryptography deployed across our systems? RSA and ECDSA appear in TLS termination, VPN tunnels, code signing, firmware verification, satellite uplink encryption, and dozens of embedded subsystems. Many of these instances are undocumented, buried in legacy configurations, or hidden inside third-party firmware that predates any quantum risk awareness.
This workshop introduces structured discovery methodologies for building a complete Cryptographic Bill of Materials (CBOM). Participants examine static analysis tools such as IBM Quantum Safe Explorer and Keyfactor EJBCA scanner alongside network traffic inspection techniques for identifying cipher suites in classified and unclassified environments. The session covers binary analysis for embedded cryptography in real-time operating systems, risk scoring frameworks that combine data sensitivity with algorithm vulnerability, and practical sequencing strategies for migration across weapons systems, C2 infrastructure, logistics, and administrative tiers.
What participants cover
- Cryptographic Bill of Materials (CBOM) generation, structure, and lifecycle management
- Static analysis, network traffic inspection, and binary analysis discovery techniques
- Tool comparison: IBM Quantum Safe Explorer, Keyfactor, and open-source CBOM generators
- Mosca inequality for HNDL exposure assessment and data shelf-life classification
- Risk scoring: data sensitivity x algorithm vulnerability x replacement complexity
- Integration with defence procurement frameworks (DEF STAN 00-091, MIL-STD-882E)