QCecuring - Enterprise Security Solutions

Algorithm Deprecation & PQC Checker

Check the security status of cryptographic algorithms against NIST guidelines and post-quantum readiness.

Type
Status
AlgorithmTypeKey SizeStatusPQC Safe?NISTNotes
AES-128Symmetric128 bitsSafeSafeApprovedStandard symmetric cipher. PQC-safe (double key size for Grover's).
AES-192Symmetric192 bitsSafeSafeApprovedStrong symmetric cipher.
AES-256Symmetric256 bitsSafeSafeApprovedRecommended for post-quantum security.
3DES / Triple DESSymmetric168 bitsDeprecatedN/ADeprecated (2023)Deprecated by NIST. Migrate to AES.
DESSymmetric56 bitsBroken / UnsafeN/AWithdrawnBroken. Do not use.
RC4SymmetricVariableBroken / UnsafeN/AProhibitedBroken. Prohibited in TLS.
ChaCha20-Poly1305Symmetric256 bitsSafeSafeApprovedModern AEAD cipher. PQC-safe.
BlowfishSymmetric32-448 bitsDeprecatedN/ANot approvedLegacy. Use AES instead.
RSA-1024Asymmetric1024 bitsBroken / UnsafeBroken / UnsafeDisallowedToo short. Factorable with current hardware.
RSA-2048Asymmetric2048 bitsSafeBroken / UnsafeApproved until 2030Minimum acceptable. Vulnerable to quantum computers.
RSA-3072Asymmetric3072 bitsSafeBroken / UnsafeApproved128-bit security equivalent. Still vulnerable to quantum.
RSA-4096Asymmetric4096 bitsSafeBroken / UnsafeApprovedStrong but slow. Still vulnerable to quantum.
ECDSA P-256Asymmetric256 bitsSafeBroken / UnsafeApproved128-bit security. Vulnerable to quantum (Shor's algorithm).
ECDSA P-384Asymmetric384 bitsSafeBroken / UnsafeApproved192-bit security. Vulnerable to quantum.
Ed25519Asymmetric256 bitsSafeBroken / UnsafeApprovedFast EdDSA. Vulnerable to quantum.
DSAAsymmetric1024-3072 bitsDeprecatedBroken / UnsafeDeprecatedDeprecated by NIST in FIPS 186-5. Use ECDSA or Ed25519.
DH-1024Key Exchange1024 bitsBroken / UnsafeBroken / UnsafeDisallowedVulnerable to Logjam attack.
DH-2048Key Exchange2048 bitsSafeBroken / UnsafeApprovedMinimum acceptable. Vulnerable to quantum.
ECDH P-256Key Exchange256 bitsSafeBroken / UnsafeApprovedStandard EC key exchange. Vulnerable to quantum.
X25519Key Exchange256 bitsSafeBroken / UnsafeApprovedModern key exchange. Vulnerable to quantum.
MD5Hash128 bitsBroken / UnsafeN/ANot approvedCollision attacks demonstrated. Do not use for signatures.
SHA-1Hash160 bitsDeprecatedN/ADeprecated (2030 disallowed)Collision attacks demonstrated. Migrate to SHA-256+.
SHA-256Hash256 bitsSafeSafeApprovedStandard hash. PQC-safe.
SHA-384Hash384 bitsSafeSafeApprovedStrong hash. PQC-safe.
SHA-512Hash512 bitsSafeSafeApprovedStrong hash. PQC-safe.
SHA3-256Hash256 bitsSafeSafeApprovedKeccak-based. PQC-safe.
ML-KEM-768 (Kyber)PQC KEM768SafeSafeFIPS 203 (2024)NIST standard PQC key encapsulation. Recommended.
ML-DSA-65 (Dilithium)PQC SignatureLevel 3SafeSafeFIPS 204 (2024)NIST standard PQC digital signature. Recommended.
SLH-DSA (SPHINCS+)PQC SignatureVariableSafeSafeFIPS 205 (2024)Stateless hash-based PQC signature. Conservative choice.

Algorithm Deprecation & PQC Readiness Checker

Check the security status of cryptographic algorithms against current NIST guidelines and post-quantum readiness. Algorithms are classified as Safe, Deprecated, or Broken for both classical and quantum threat models.

Key takeaways

  • All RSA and ECC algorithms are vulnerable to quantum computers (Shor's algorithm)
  • Symmetric algorithms (AES) and hash functions (SHA-2, SHA-3) are PQC-safe at current key sizes
  • NIST has standardized ML-KEM (Kyber) and ML-DSA (Dilithium) as PQC replacements
  • 3DES, DES, RC4, MD5, and SHA-1 should be migrated away from immediately

Ready to Secure Your Enterprise?

Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.