Cryptographic Parameter Calculator

Use Case
Security Level
Quantum Readiness Required

Current Algorithms in Use

10 years
TLS Version in Use
Security Target256-bit

"Harvest Now, Decrypt Later" Risk Assessment

Harvest Now RiskHIGH
Must Migrate By2030

Your data needs protection until 2036, past quantum availability estimates. While AES-256 provides 128-bit post-quantum security, asymmetric key exchanges are still vulnerable. Begin hybrid PQC migration now.

Quantum Threat Timeline

202620292031203320362039204220450%25%50%75%100%Migrate ByData Expires

Recommended Algorithms

symmetricAES-256-GCM
Key size: 256-bit
Standard: NIST SP 800-38D
Gold standard for data-at-rest encryption
asymmetricRSA-15360 or ECC P-521
Key size: 15360-bit / 521-bit
Standard: NIST SP 800-57
P-521 strongly preferred; RSA-15360 is impractical
hashSHA-512
Key size: 512-bit output
Standard: FIPS 180-4
Maximum classical hash security
pqcML-KEM-1024 (Kyber)
Key size: 1568-byte public key
Standard: NIST FIPS 203
Highest-security post-quantum KEM

Protocol Analysis

TLS 1.2secure
TLS 1.2 is acceptable. Ensure only strong cipher suites are enabled. Plan TLS 1.3 migration.
RSA-2048weak
RSA-2048 provides only 112-bit security and is being phased out. Migrate to RSA-3072+ or ECC P-256.
AES-256secure
AES-256 provides the strongest symmetric security. Preferred for long-term data protection.
SHA-256secure
SHA-256 provides 128-bit collision resistance. Standard choice for most hashing needs.

Migration Roadmap (13 months)

Urgency: soon
PhaseActionTimelineEffortAffected Systems
Phase 1: InventoryCatalog all systems using current cryptographic algorithms. Map dependencies and data flows.Month 1-2MEDIUMAll systems
Phase 2: TestingDeploy target algorithms in test environments. Validate compatibility with existing infrastructure.Month 2-4MEDIUMTest/staging environments
Phase 3: Migrate RSA-2048Replace RSA-2048 with ECC P-256 or RSA-3072+. Implement hybrid mode where applicable.Month 4-10MEDIUMSystems using RSA-2048
Phase 3: Migrate AES-256Replace AES-256 with AES-256-GCM (maintain). Implement hybrid mode where applicable.Month 4-7LOWSystems using AES-256
Phase 3: Migrate SHA-256Replace SHA-256 with SHA-256 (maintain, add SHA-384 for 192-bit+). Implement hybrid mode where applicable.Month 4-10MEDIUMSystems using SHA-256
Phase 4: CutoverRemove legacy algorithm support. Enforce new algorithms in production. Update certificates.Month 10-12HIGHAll production systems
Phase 5: ValidationVerify all systems use target algorithms. Conduct penetration testing. Update documentation.Month 12-13MEDIUMAll systems

Compliance Mapping

AlgorithmPCI DSS 4.0FIPS 140-3NIST SP 800-131A
RSA-2048Not recommended after 2030FIPS 186-5 approvedDisallowed after 2030 (SP 800-131A)
AES-256CompliantFIPS 197 approvedRecommended (SP 800-57)
SHA-256CompliantFIPS 180-4 approvedRecommended (SP 800-57)

Algorithm Comparison (RSA vs ECC vs PQC)

AlgorithmClassicalQuantumKey SizePerf
RSA-2048112-bitBroken (Shor)2048-bitslow
RSA-3072128-bitBroken (Shor)3072-bitslow
ECC P-256128-bitBroken (Shor)256-bitfast
ECC P-384192-bitBroken (Shor)384-bitfast
AES-128128-bit64-bit (Grover)128-bitfast
AES-256256-bit128-bit (Grover)256-bitfast
ML-KEM-512 (Kyber)128-bit128-bit800-byte PKfast
ML-KEM-1024 (Kyber)256-bit256-bit1568-byte PKmoderate
ML-DSA-44 (Dilithium)128-bit128-bit1312-byte PKfast
ML-DSA-87 (Dilithium)256-bit256-bit2592-byte PKmoderate

Quantum Timeline

NIST recommends beginning PQC migration now. Cryptographically relevant quantum computers estimated by 2030-2035. Harvest-now-decrypt-later attacks are an immediate concern for long-lived secrets.

Migration Checklist

  • Inventory all cryptographic assets and key management systems
  • Identify data with long-term confidentiality requirements (> 10 years)
  • Assess crypto agility — can algorithms be swapped without major refactoring?
  • Deploy AES-256 for all symmetric encryption
  • Implement hybrid classical+PQC key exchange for TLS connections
  • Deploy ML-KEM (Kyber) for key encapsulation in new systems
  • Plan ML-DSA (Dilithium) migration for code signing and certificates
  • Test PQC library compatibility with existing infrastructure
  • Establish timeline for full PQC-only transition (target: 2030)